Come back often, as we review
technology news, information and analysis on the trends
that matter to Healthcare IT professionals.
By: YES Medical System
Much of the focus, with the latest major vulnerability, has been on personal devices and equipment. The vulnerabilities, exposed in Spectre and Meltdown, span processors made over the past 20 plus years. Companies around the world are working tirelessly to protect and patch systems; however, there are major implications for cloud-based users. The exploits allow a hacker, or criminal, to peer into the private data of a client, through possible data leaking. There are many types of configurations for cloud-based systems, and many who adopt these solutions do not understand their type of service plan. In situations where the same cloud-based server is used by dozens of clients those configurations can potentially be a major threat to your private patient data. The Spectre vulnerability could potentially let any attacker steal information from the same server. The size of the breach is extensive and cyber-criminals may continue to exploit it for years to come. Make sure you understand how to secure and protect your data, keeping yourself safe from legal liability with your medical patient data.
By: YES Medical System
Ransomware is malicious software that locks and encrypts your computer or computer files, demanding payment to get them back. It could affect all programs and files. Recently in news ransomware attacks took place at Norfork General Hospital in Simcoe, Presbyterian Medical in L.A and the Ottawa General Hospital.
By: YES Medical System
We have become so trusting when it comes to our personal information. We leave ourselves open to the web, providing it with more alienable information. We don't take the time needed to understand or know what happens with our data online.
By: YES Medical Systems
The Internet is everywhere. From your mobile phone to your desktop computer. Your car and even the connected home now contains some type of technology able to communicate online. Since computers are an important part of our lives today we must be even more vigilant to ensure that we take proper security measures. Spam, viruses, malware, spyware, phishing and "brute force" attacks can corrupt your device, computer or technological device.
By: YES Medical Systems
Do you remember Windows ME? Or how about Windows Vista? Some of these names seem to goes back to Operating Systems we wish to forget. With the announcement of Windows 10 Microsoft decided to totally skip version 9, opting to leave Windows 8, and memories of the Metro interface, as a distant 1-digit memory.
Simple tips on protecting yourself from identity theft