Fact Based List:

Top 5 mobile medical device security risks (according to the DHS)

Submitted by jryan@mcol.com on Mon, 07/22/2013 - 11:34


  1. Insider: The most common ways employees steal data involved network transfer, be that email, remote access, or file transfer
  2. Malware: These include keystroke loggers and Trojans, tailored to harvest easily accessible data once inside the network
  3. Spearphishing: This highly-customized technique involves an email-based attack carrying malicious attack disguised as coming from a legitimate source, and seeking specific information
  4. Web: DHS lists silent redirection, obfuscated JavaScript and search engine optimization poisoning among ways to penetrate a network then, ultimately, access an organization’s data
  5. Lost equipment: A significant problem because it happens so frequently, even a smartphone in the wrong hands can be a gateway into a health entity’s network and records


Source: National Cybersecurity and Communications Integration Center
Source URL: http://info.publicintelligence.net/NCCIC-MedicalDevices.pdf



List Ratings:   
0
No votes yet
Your rating: None

Lists You Might Also Be Interested In



Login or register to post comments