Legacy device and outdate software to slow medical device growth – Technologist

The rapid integration of new technology and digital health devices into healthcare systems has revolutionized patient care and diagnostic processes. However, the increased reliance on these devices has also exposed the healthcare industry to cybersecurity threats. In the report, Cybersecurity in Medical Devices, GlobalData forecasts the market for cybersecurity in medical devices to grow at … Read more

28th December | Be Cybersafe – Technologist

Welcome to the latest edition of the Cybersafe Cyber Threats, a weekly series in which we bring attention to the latest cyber attacks, scams, frauds, and malware including Ransomware, to ensure you stay safe online. Snatch ransomware group claims a major attack on Kraft Heinz The notorious Snatch ransomware group has declared responsibility for orchestrating … Read more

Spear-Phishing: The Silent Cyber Threat – Munio – Technologist

The Silent Cyber Threat: Spear-phishing emerges as a sophisticated and personal attack, often overlooked in the UK business world. The common sentiment, “It will never happen to me,” is precisely what spear-phishers rely on. We aim to dismantle this misconception, illustrating the insidious nature of spear-phishing, how it operates, its consequences, and, importantly, how to … Read more

The DNA of privacy: FTC guide to keeping sensitive data private – Technologist

The FTC has again emphasized the importance of protecting genetic data and consumer privacy in the context of genetic testing and biometric surveillance technology with new guidance posted on January 5, 2024. Highlighting a set of enforcement actions (CRI Genetics, 1Health/Vitagene, and Genelink), and referencing additional orders involving sensitive data (Ring and Amazon/Alexa), the FTC … Read more

Gartner: 4 action items to reduce 3rd-party cybersecurity risks – Technologist

In a recent Gartner survey, 45% of organisations experienced third-party-related business interruptions. This is despite the increased investments in third-party cybersecurity risk management (TPCRM) over the last two years. Zachary Smith “Third-party cybersecurity risk management is often resource-intensive, overly process-oriented and has little to show for in terms of results,” said Zachary Smith, Sr principal … Read more

Navigating the Crucial Intersection of Cybersecurity. – Technologist

Trust is the bedrock of any relationship, and the alliance between a law firm and its IT provider is no exception.  An area where this trust is particularly palpable is in email communications. Emails exchanged between clients, employees, and IT suppliers can unwittingly become a breeding ground for cyber threats.  A breach in either party’s … Read more