Evidence that the world is going mobile is everywhere. The market for connected health technology is projected to hit $117 billion by 2020, and 86 percent of clinicians believe mobile apps will be central to patient health in that time frame. At least 50 percent of smartphone users have downloaded a mobile health app. We also see mobile’s growth with the appearance of tablets, more powerful smartphones and Fitbits. As healthcare patients turn into healthcare consumers, patient portals and apps …

As the gap between desktop and mobile becomes smaller and smaller, businesses are encouraging the use of mobile apps and a BYOD environment. But with this power of creativity and productivity comes responsibility to security, and that’s something many CISOs are worried about. One of these threats to enterprise security is data jacking. It’s the misuse or theft of data on a mobile from its primary owner. Examples of data jacking include ransomware, mobile malware, and theft of mobile devices …

What is malvertising?

Posted on January 11, 2017 by

Malvertising, a portmanteau of “malicious” and “advertising” has quickly become popular with bad guys everywhere. Its first appearance was detected in 2007, and it’s been on the rise ever since. What makes this form of malware so popular? Malvertising is more dangerous than typical malware because as an end user, you could be a victim without knowing it. According to Elad Sharf of Websense, malvertising attracts hackers because “they can easily spread across a large number of legitimate websites without …

We’ve already talked about the need to invest in an IT security budget as a best practice for business. Whether that’s an alarm for the door, a safe to guard money, or a firewall behind its network systems, security helps people and organizations sleep better at night. But even with a lock on the door, burglars can still find a way to get in. The same goes for the security of your data. We’ve all heard of the data breaches of Target, …

What is social engineering? It’s the art of manipulation that relies heavily on human interaction and psychology to trick people into revealing sensitive information about themselves or others. Social engineering works to exploit the human inclination to trust others, and for that reason, it’s one of the most dangerous and murky threats facing organizations today. Think about it—why waste time trying to crack a password that could take hours or days, when you could get someone at the company to …

Mark Stanislav’s title is “Security Evangelist.” Online Tech has previously provided him a virtual pulpit from which to preach and his barnstorming tour continued last week in Las Vegas, where he spoke at the recently concluded DEF CON 22 Hacker Conference. Stanislav and Duo Security colleague Zach Lanier presented “The Internet of Fails: Where IoT Has Gone Wrong and How We’re Making it Right,” described as a dive into research, outcomes and recommendations regarding information security for the “Internet of …

In contrast to the unseasonably cold weather Columbus, Ohio, has experienced of late, this week’s InfoSec Summit kicked off in bright purple ‘Aloha’ style with Jim Manico’s recommendations for improving web application security. Only one other attendee could match his shirt color, but none were equal to the energy with which Jim highlighted some serious software security concerns. No, this wasn’t a dig on the software developers who face an incredibly daunting tempest of deadlines, budget constraints and requirements as …

More and more healthcare organizations are allowing employees to connect their own mobile devices to their network, but more than half are not confident those devices are secure. According to the Ponemon Institute’s fourth annual Benchmark Study on Patient Privacy and Data Security, Bring Your Own Device (BYOD) programs usage continues to rise despite concerns about employee negligence and the use of insecure mobile devices. According to the study: “…88 percent of organizations permit employees and medical staff to use …

BY TATIANA MELNIK Health IT Attorney As the clock struck midnight on New Year’s Eve, it was already clear that 2014 was shaping up to be an exciting year for all things healthcare IT. With enforcement actions squarely on the heels of the new year, the on-going healthcare-related data breach litigation (and a renewed focus on data breaches from federal legislators because of the Target incident), the upcoming ICD-10 conversion deadline, the continued move to BYOD, and the growth of …

There’s much to talk about here at the mHealth summit in National Harbor, MD. Here’s a peek at what we’ve been hearing thus far today: Opening Remarks: Sharon D. Agostino, VP Corporate Citizenship, Johnson & Johnson. Sharon spoke about Johnson & Johnson’s participation in MAMA (Mobile Alliance for Maternal Action), a mobile health initiative that sends expecting mothers mobile information throughout their pregnancy and the first year after childbirth to help bolster confidence and have the right conversations with their …

Get started now. Exceptional service awaits.

Live Chat