Information Security
In A Healthcare Setting

 

Safeguarding Electronic Protected Health Information
From Ransomware And Other Threats

Learn More

January 16, 2017

WannaCry attack infects Bayer medical devices in US hospitals

Becker Hospital Review  Read Article

May 14, 2017

Cyber Security Experts Fear Continued Spread Of 'Unprecedented' Ransomware Attack

Fortune Read Article

May 16, 2017

Why hospitals are so vulnerable to ransomware attacks

CNN Money Read Article

February 2, 2017

Ransomware completely shuts down Ohio town government

TechCrunch Read Article

January 12, 2017

2016 averaged 1 healthcare data breach per day

Becker's Hospital Review  Read Article

January 17, 2017

Extortionists Wipe Thousands of Databases, Victims Who Pay Up Get Stiffed

KrebsOnSecurity.com Read Article

February 17, 2017

Arby’s Acknowledges Breach

KrebsOnSecurity.com  Read Article

January 31, 2017

Every Scotty’s Brewhouse employee affected by data breach; scammer gets copy of all 4,000 W-2 forms

FOX59 Indianapolis  Read Article

February 1, 2017

GitLab Suffers Major Backup Failure After Data Deletion Incident

TechCrunch  Read Article

The Top Five Practices for Securing Your Data: Software Updates

All software contains bugs. Some software bugs result in vulnerabilities, weaknesses that could allow attackers to gain unauthorized access to or compromise the integrity of your data. Software developers release updates to their software in order to fix bugs, and in turn, fix vulnerabilities. Installing software updates in a timely manner is the most important…

Privacy Is Good For Business

StaySafeOnline.org, powered by the National Cyber Security Alliance has published “Privacy Is Good For Business.” It contains a list of actions you should take to “create a culture of respecting privacy, safeguarding data and enabling trust in your organization.” It includes tips like, “Educate your employees about their role in privacy, security and respecting and protecting…

Worlds Biggest Data Breaches

David McCandless, and his talented team at InformationIsBeautiful.net have created an interactive, and up-to-date, visual representing the largest data breaches. It contains links to the original articles. The problem I have with going to this site is I get drawn into the ingenious graphics and visuals of data and can’t leave. His Mission Statement Reads Myself and the small…

Live Online Training

Available On Any Device.

Ongoing Threat Training

Protect Your Organization From The Global Threat Of A Data Breach

Consulting

Trained, Experienced & Certified

Threat Series: Ransomware

Could your organization operate if all of your data was inaccessible? Ransomware, a form of malware, encrypts files such as documents and photos, and requires a ransom be paid in order to decrypt the files. Harvard Business Review says, “The Best Cybersecurity Investment You Can Make Is Better Training. Spending millions on security technology can certainly make an executive feel safe. But the major sources of cyber threats aren’t technological. They’re found in the human brain, in the form of curiosity, ignorance, apathy, and hubris. These human forms of malware can be present in any organization and are every bit as dangerous as threats delivered through malicious code.” And since it’s impossible to prevent every attack, we’ll also discuss how to respond to an incident.

The Threat Is Real

Losing patient data will result in losing the patient’s trust, and could result in the unthinkable. Ransomware is one of the real threats to businesses and organizations that could result in the end of the enterprise. The recent WannaCry attacks have many people in healthcare very concerned.

Cyber Criminals Are Looking For Your Weaknesses.
Are You?

  • Train Your Employees
  • Make Improvements Needed
  • Stay Informed, Keep Software Up-To-Date
Secure Your Webinar Spot Secure Your Seminar Spot

About the Instructor

GuardianISG

Shane Albright

Shane Albright has nearly a decade of experience in IT operations and information security in a variety of environments including two publicly-traded companies and a healthcare facility at a large research university. He currently holds a CompTIA Security+ certification, a CompTIA Advanced Security Practitioner (CASP) certification, and a GIAC Security Essentials (GSEC) certification. Shane has the unique ability to speak on technical subjects so everyone can understand.

Register Now!

Webinar Seminar