Information Security
In A Healthcare Setting
Safeguarding Electronic Protected Health Information
From Ransomware And Other Threats
January 16, 2017
WannaCry attack infects Bayer medical devices in US hospitals
Becker Hospital Review Read Article
May 14, 2017
Cyber Security Experts Fear Continued Spread Of 'Unprecedented' Ransomware Attack
Fortune Read Article
January 17, 2017
Extortionists Wipe Thousands of Databases, Victims Who Pay Up Get Stiffed
KrebsOnSecurity.com Read Article
January 31, 2017
Every Scotty’s Brewhouse employee affected by data breach; scammer gets copy of all 4,000 W-2 forms
FOX59 Indianapolis Read Article
February 1, 2017
GitLab Suffers Major Backup Failure After Data Deletion Incident
TechCrunch Read Article
The Best Cybersecurity Investment You Can Make Is Better Training – Harvard Business Review
Spending millions on security technology can certainly make an executive feel safe. But the major sources of cyber threats aren’t technological. They’re found in the human brain, in the form of curiosity, ignorance, apathy, and hubris. These human forms of malware can be present in any organization and are every bit as dangerous as threats…
The Top Five Practices for Securing Your Data: Software Updates
All software contains bugs. Some software bugs result in vulnerabilities, weaknesses that could allow attackers to gain unauthorized access to or compromise the integrity of your data. Software developers release updates to their software in order to fix bugs, and in turn, fix vulnerabilities. Installing software updates in a timely manner is the most important…
Privacy Is Good For Business
StaySafeOnline.org, powered by the National Cyber Security Alliance has published “Privacy Is Good For Business.” It contains a list of actions you should take to “create a culture of respecting privacy, safeguarding data and enabling trust in your organization.” It includes tips like, “Educate your employees about their role in privacy, security and respecting and protecting…
Worlds Biggest Data Breaches
David McCandless, and his talented team at InformationIsBeautiful.net have created an interactive, and up-to-date, visual representing the largest data breaches. It contains links to the original articles. The problem I have with going to this site is I get drawn into the ingenious graphics and visuals of data and can’t leave. His Mission Statement Reads Myself and the small…
Live Online Training
Available On Any Device.Ongoing Threat Training
Protect Your Organization From The Global Threat Of A Data BreachConsulting
Trained, Experienced & CertifiedThreat Series: Ransomware
Could your organization operate if all of your data was inaccessible? Ransomware, a form of malware, encrypts files such as documents and photos, and requires a ransom be paid in order to decrypt the files. Harvard Business Review says, “The Best Cybersecurity Investment You Can Make Is Better Training. Spending millions on security technology can certainly make an executive feel safe. But the major sources of cyber threats aren’t technological. They’re found in the human brain, in the form of curiosity, ignorance, apathy, and hubris. These human forms of malware can be present in any organization and are every bit as dangerous as threats delivered through malicious code.” And since it’s impossible to prevent every attack, we’ll also discuss how to respond to an incident.
The Threat Is Real
Losing patient data will result in losing the patient’s trust, and could result in the unthinkable. Ransomware is one of the real threats to businesses and organizations that could result in the end of the enterprise. The recent WannaCry attacks have many people in healthcare very concerned.
Cyber Criminals Are Looking For Your Weaknesses.
Are You?
- Train Your Employees
- Make Improvements Needed
- Stay Informed, Keep Software Up-To-Date

About the Instructor

Shane Albright
Shane Albright has nearly a decade of experience in IT operations and information security in a variety of environments including two publicly-traded companies and a healthcare facility at a large research university. He currently holds a CompTIA Security+ certification, a CompTIA Advanced Security Practitioner (CASP) certification, and a GIAC Security Essentials (GSEC) certification. Shane has the unique ability to speak on technical subjects so everyone can understand.