Tag Archive for: teaches

What UnitedHealth’s cyberattack teaches about cybersecurity


Do employers really know how safe their data is? UnitedHealth’s payment processing company Change Healthcare found out the hard way after being hacked last month — and the consequences are staggering.

Change Healthcare is responsible for 14 billion clinical, financial and operational transactions each year, according to its website, and processes an estimated 50% of medical claims in the U.S. To put it lightly, Change Healthcare’s cyberattack on Feb. 21 put American provider and patient data at risk, and now the U.S. government is opening an investigation to find out how much data has been breached and if the company has complied with HIPPA (the Health Insurance Portability and Accountability Act), which protects patient information.

“Ransomware attacks like the one on Change Healthcare aim to stop organizations from functioning by using encryption to make critical systems unusable,” says Mark Stockley, cybersecurity expert at Malwarebytes, an anti-malware software company. “Attacks are carried out by criminal hackers who break into vulnerable organizations, explore their networks, steal valuable data and quietly distribute their ransomware to as many computers as they can.”

Read more: Alabama has updated its IVF ruling. What can employers learn from it?

Providers under UnitedHealth are struggling to get reimbursed for their services, and patients are struggling to access medications as the healthcare company tries to restore medical claims and electronic payment access. This means hospitals and pharmacies are left to wait and absorb an unfathomable financial burden. The U.S. Department of Health and Human Services has asked insurers to waive certain authorizations and accept physical bills from doctors and hospitals — but those can take months to process.  

UnitedHealth stated these services should be up and running later this month, but there’s no fixing the breach itself. The American Hospital Association has deemed this attack the most “significant” event of its kind in the history of the U.S. healthcare system. 

Read more: Ed Ligonde shares the ‘why’ that guides his career in benefits

Stockley stresses that cyberattacks are only becoming more common, with the Office for…

Source…

Live Webinar | A Master Class on IT Security: Roger Grimes Teaches Ransomware MitigationWebinar.


Fraud Management & Cybercrime
,
Ransomware
,
Video

Live Webinar | A Master Class on IT Security: Roger Grimes Teaches Ransomware Mitigation

Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.

With 30+ years’ experience as a computer security consultant, instructor, and award-winning author, Roger has dedicated his life to making sure you’re prepared to defend against quickly evolving IT security threats like ransomware.

Register for this Masterclass with Roger to learn what you can do to prevent, detect, and mitigate ransomware.

Register for this session and learn:

  • How to detect ransomware programs, even those that are highly stealthy
  • Official recommendations from the Cybersecurity & Infrastructure Security Agency (CISA)
  • The policies, technical controls, and education you need to stop ransomware in its tracks
  • Why good backups (even offline backups) no longer save you from ransomware

You can learn how to identify and stop these attacks before they wreak havoc on your network.

Source…

A Master Class on IT Security: Roger Grimes Teaches Ransomware MitigationWebinar.


Anti-Phishing, DMARC
,
Business Email Compromise (BEC)
,
Fraud Management & Cybercrime

Live | A Master Class on IT Security: Roger Grimes Teaches Ransomware Mitigation

Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.

With 30+ years’ experience as a computer security consultant, instructor, and award-winning author, Roger has dedicated his life to making sure you’re prepared to defend against quickly evolving IT security threats like ransomware.

Register for this Masterclass with Roger to learn what you can do to prevent, detect, and mitigate ransomware.

Register for this session and learn:

  • How to detect ransomware programs, even those that are highly stealthy
  • Official recommendations from the Cybersecurity & Infrastructure Security Agency (CISA)
  • The policies, technical controls, and education you need to stop ransomware in its tracks
  • Why good backups (even offline backups) no longer save you from ransomware

You can learn how to identify and stop these attacks before they wreak havoc on your network.

Source…

Eastland-Fairfield program teaches students about cyber security at New Albany High School


The effort to beat computer hackers at their own game is being taught at New Albany High School.

The Eastland-Fairfield Career and Technical Schools has set up a satellite cyber-security lab at NAHS.

Andrew Schockman, 17, is pictured at his computer station at the new cyber-security lab at New Albany High School. Eastland-Fairfield Career and Technical Schools opened the training facility this year at NAHS. Schockman, a junior at the high school, said he enrolled in the class because it sounded interesting.

Eighteen juniors are enrolled in the class, which aims to give students a crack at a job out of high school or another skill set as they head to college.

Ty James, who teaches the class for Eastland-Fairfield, said the students are learning the basics of understanding multi-threat vectors and layered approaches to the network.

With more people working remotely from their own computers, exposure of corporate data becomes an even greater risk, James said.

“There are things that are going to introduce the threat to the network because hackers are looking for things that are opening something at work,” he said. “It really increases the surface area when people are working on separate networks from their homes.”

Source…