Healthcare information management

5 Risks Hospitals Face

Hospitals and the overall healthcare sector are experiencing a major digital evolution that is pushing them to change their traditional ways of information management. To close the gap with their needs and changing IT infrastructure agility, security, compliance, and performance, many organizations are probing for benefits of cloud. The traction of on-demand cloud services along with cloud security have swiftly changed the healthcare sector mindset from “why move to the cloud?” to “what and how should we move to cloud?”

Threat Detection

Machine Learning – Threat Detection Game Changer

In a past life I use to be part of a team that developed Video Games. Besides the storyboarding and coding that was part of the process, we also had to accommodate the idea that any user might try to ‘break’ the game in one way or another. We built in fail safes of all sorts to make sure that the game would always run as expected with a predicted outcome. Part of this process was to try and anticipate what type of nefarious action the player would make.

WannaCry

WannaCry – Keep Calm and Remember the Basics

The globe was recently hit by a massive ransomware campaign that stretched across 150 countries and infected tens of thousands of systems. The Russian Interior Ministry was affected, certain NHS hospitals were turning patients away and a few manufactures had to cease operations. Needless to say, this was a really big deal. Companies were left scrambling on Friday afternoon in attempts to make sure they weren’t the latest victim of the WannaCryptor 2.0, also known as WannaCry, malware from wreaking havoc in their network. This is the second iteration of this malware and it uses exploits previously found within leaked NSA hacking tools (ETERNALBLUE) that takes advantage of a bug within Windows SMBv1 protocol.

cyberattacks

Brain Power: Using The Neuromorphic Data Microscope for Cybersecurity Analysis

Digital computers and human brains have different strengths and weaknesses. If you give me a long list of arthimetic problems to solve, at some point I’ll slip up. “How did I get the wrong answer on that division problem? Oh yeah, I thought there was a 3 in the tens place of the dividend when it’s actually a 6. I’ve just been staring at all of these numbers for so long that I’m starting to get tired!” But CAPTCHAs are easy for me to use, and they somehow impede malicious web bots that try to break through authentication barriers.

Identity Management

Identity Management and Network Access Control

We hear about a new major security breach almost every week. Some of them rely on weak keys to do so. In the famous TJ Maxx breach, it is believed the hackers exploited a weak pre-shared key for Wifi. Had they been using WPA2-802.1x the key would have been infinitely stronger. This means the hackers would need to be in the same location for a longer period time and potentially dissuading them from continuing the hack. Even if they stuck around, it would have been obvious to staff that a car was lurking around for too long. Identity management would have helped to enable 802.1x and Radius, which generates unique keys and regenerates them in shorter intervals.