How to Put a Lid on Container Security as More Companies Adopt SaaS

How to Put a Lid on Container Security as More Companies Adopt SaaS

Research shows what many of us in the cybersecurity space have known for several years now: Many organizations – within the United States as well as around the world – are increasingly turning to the cloud to run many of its business critical operations.

3 Factors to Consider When Deciding to Go All-In or Diversify Cloud Service Providers

3 Factors to Consider When Deciding to Go All-In or Diversify Cloud Service Providers

As more companies look to incorporate cloud computing storage into their IT portfolios, a heated debate has come to the fore: Should companies go with one cloud service provider (CSP) or diversify their investment with multiple vendors?

Empower Your Security Operations Center With These Technology Tools

Empower Your Security Operations Center With These Technology Tools

Recent studies find companies that incorporate Security Information Events Monitoring/Management and Security Operations Center solutions as part of their cybersecurity portfolio save nearly $2 million with a 23 percent return on investment. Consequently, many organizations deploying these tools expect that they will resolve their IT service problems and stop cyberattacks. 

5 Must-Have Requirements When Building a Security Operations Center

5 Must-Have Requirements When Building a Security Operations Center

Highly visible breaches and attacks have brought an intense focus on organizations’ incident detection, investigation, and mitigation capabilities. Just increasing security spending, however, does not guarantee more protection. Achieving the goal of better security depends on how that budget is allocated; what people, procedures and infrastructure are put into place; and how the security program is managed and optimized over the long term.

Avoid These 3 Mistakes When Deploying Security Operations Centers

Avoid These 3 Mistakes When Deploying Security Operations Centers

No matter how sophisticated company’s cyberdefenses are, hackers have proven they can find a way into their systems due largely to the people aspect of cybersecurity: As long as networks are built and maintained by people, there will be mistakes made creating opportunities for hackers to exploit.

4 Reasons Why Security Operations Centers are a Must-Have in 2017

4 Reasons Why Security Operations Centers are a Must-Have in 2017

The year 2017 is critical for cybersecurity. Cyberattacks continue to increase in scope and complexity, with the number of data breach disclosures jumping 40 percent in 2016. The moment a company thinks it plugged a security gap, creative hackers have consistently proven they are able to exploit other weaknesses quickly.  

Businesses are waking up to the sobering fact that they must beef up spend and resources to create a better cybersecurity strategy. Unfortunately, there’s a tremendous shortage of cybersecurity professionals in the job market today who could execute those strategies. Clearly supply is woefully behind demand, forcing businesses to make the difficult decision as to whether to strike out on their own to build an in-house Security Operations Center (SOC) or work with a third-party managed security services provider to safeguard their company.

3 Ways to Engage with US Cyber Vault at HIMSS Next Week

3 Ways to Engage with US Cyber Vault at HIMSS Next Week

All of us here at US Cyber Vault have been preparing for HIMSS 2017, the largest healthcare IT show in America. We’re excited that in just a few days it will finally be here! 

US Cyber Vault is a leading sponsor of the Cyber Security Command Center at HIMSS 2017 in Orlando, FL - Feb 19-23 both in the Cybersecurity Command Center at Kiosk 376-13 and in our own flagship booth 487 right next to the Command Center. 

US Cyber Vault Unveils Future of Managed Cybersecurity Services at HIMSS 2017

US Cyber Vault Unveils Future of Managed Cybersecurity Services at HIMSS 2017

US Cyber Vault’s managed security services for on-premises and cloud environments help healthcare companies extend their IT teams and secure sensitive data.

New eBook: The Prescription to Cure Cyberattacks in Healthcare IT

New eBook: The Prescription to Cure Cyberattacks in Healthcare IT

Cyberattacks cost the healthcare industry nearly $6 billion every year, with no end in sight. More than 30 percent of all reported data breaches in the past year originated in the healthcare industry, exposing millions of individuals' records in the process.

5 LESSONS WE LEARNED FROM HEALTHCARE CYBERATTACKS IN 2016

5 LESSONS WE LEARNED FROM HEALTHCARE CYBERATTACKS IN 2016

During a time of great innovation in many industries, unfortunately one of the biggest developments in 2016 in the healthcare industry was the rise of cyberattacks – costing the industry approximately $6 billion. While many healthcare it companies want to point to the rise of electronic medical records as a point of innovative pride, it was also a flashpoint for hackers. It's the unintended consequence of ditching paper records for electronic, on in-house systems or in the cloud. It’s easier to steal or compromise a greater number of records at one time when they're digital.  

WOMEN IN HEALTH IT HAPPENINGS AT HIMSS 2017 IN ORLANDO

WOMEN IN HEALTH IT HAPPENINGS AT HIMSS 2017 IN ORLANDO

I’m looking forward to attending HIMSS for my second year. I met so many terrific woman last year at the many events and the inaugural WomeninHIT reception. I thought I’d put together a list of what is going on this year that would be easy to print and bring along.  Hope you find this helpful.  

RANSOMWARE IS HEALTHCARE CYBERSECURITY'S #1 ENEMY IN 2017

RANSOMWARE IS HEALTHCARE CYBERSECURITY'S #1 ENEMY IN 2017

We saw ransomware attacks rear their ugly head within healthcare companies in 2016, and this year looks as though those threats will only increase. According to a recent report from the U.S. Government, there were nearly 4,000 ransomware attacks each day in 2016, quadruple the amount reported in 2015. 

5 WAYS TO PREPARE FOR THE UNKNOWN IN CYBERSECURITY

5 WAYS TO PREPARE FOR THE UNKNOWN IN CYBERSECURITY

The threat landscape for all industries is constantly evolving – and healthcare is no exception. In 2016, we saw an increase in ransomware attacks paralyzing hospitals through their computer systems, not allowing them to properly treat patients until they paid bounties to hackers threatening to steal their protected health information.  

While there are clear trends shaping the future of healthcare IT, there’s no way to fully predict the future. There will always be unknown variables threatening to destroy even the best laid plans. So what can you do? Instead of shrinking in fear, take these five steps to prepare for the unknown in cybersecurity.

HOW TO RESUSCITATE BRAND REPUTATION AFTER A CYBERATTACK

HOW TO RESUSCITATE BRAND REPUTATION AFTER A CYBERATTACK

Part of any good security service, however, is ensuring you have the right communication systems in place should the inevitable happen. You need to quickly understand where the data breach occurred, which information was compromised, how quickly it was detected, and what you are doing to mitigate ex-filtration of your data (information getting into the wrong hands used for nefarious purposes).  

This means cybersecurity is not just an IT problem or information security problem – it’s also a business problem that goes to the highest levels of your management team 

10 OF THE LARGEST HEALTHCARE DATA BREACHES OF 2016

10 OF THE LARGEST HEALTHCARE DATA BREACHES OF 2016

After IBM declared 2015 the year of the healthcare data breach, was 2016 the year we finally turned the corner and made headway against hackers in the cyberwar for individuals’ protected health information?  

Unfortunately, that was not the case. While there wasn’t a high-profile breach such as Anthem Health with which to contend, there were still plenty of successful cyberattacks stealing millions of individuals’ personally identifiable information (PII) and protected health information (PHI).  

As we continue to wage the cyber battle in 2017, it’s important to take stock at what happened in order to prepare for a safer future. Those who do not remember the past are condemned to repeat itLet’s take a look at 10 of the biggest healthcare data breaches in 2016.

US CYBER VAULT'S TOP 3 SECURITY PREDICTIONS FOR 2017

US CYBER VAULT'S TOP 3 SECURITY PREDICTIONS FOR 2017

Just days away from the New Year, it’s clear that 2017 will be a critical year for cybersecurity. Last week, I shared my top 2016 takeaways in the cybersecurity world, and it’s clear that attacks are only increasing in scope and complexity. The moment a company thinks it has plugged a security gap, a creative hacker finds another one and quickly exploits it. Why? Hackers are following the money trail.  

US CYBER VAULT'S 3 TOP CYBERSECURITY TAKEAWAYS IN 2016

US CYBER VAULT'S 3 TOP CYBERSECURITY TAKEAWAYS IN 2016

As we rapidly approach the end of 2016, it was a year to forget for many businesses’ cybersecurity programs. The number, frequency, and impact of cyberattacks continued to increase around the world, leaving many companies to face the harsh reality that it’s a matter of when – not if – they will be hacked.  

FEAR: WHEN I GET THE CALL A 3AM THAT WE'VE HAD A DATA BREACH, WILL I BE READY?

FEAR: WHEN I GET THE CALL A 3AM THAT WE'VE HAD A DATA BREACH, WILL I BE READY?

This week, we’ll take a closer look at the fear of preparedness – specifically, “When I get the call at 3am that we’ve been breached, will I be ready to respond?” 

It’s not a matter of if your company will be breached, but when it will occur. The number of data breaches continue to increase in frequency and scope. Hackers are exploiting more gaps in 20th century IT infrastructure faster than companies have been able to respond to them