Fact Based List:
Top 5 mobile medical device security risks (according to the DHS)
Submitted by jryan@mcol.com on Mon, 07/22/2013 - 11:34
- Insider: The most common ways employees steal data involved network transfer, be that email, remote access, or file transfer
- Malware: These include keystroke loggers and Trojans, tailored to harvest easily accessible data once inside the network
- Spearphishing: This highly-customized technique involves an email-based attack carrying malicious attack disguised as coming from a legitimate source, and seeking specific information
- Web: DHS lists silent redirection, obfuscated JavaScript and search engine optimization poisoning among ways to penetrate a network then, ultimately, access an organization’s data
- Lost equipment: A significant problem because it happens so frequently, even a smartphone in the wrong hands can be a gateway into a health entity’s network and records
Source: National Cybersecurity and Communications Integration Center
Source URL: http://info.publicintelligence.net/NCCIC-MedicalDevices.pdf
List Ratings: |
Lists You Might Also Be Interested In
- LinkedIn Groups Corresponding to Ten Selected Keywords
- Top Ten U.S. Drugs (by sales) Losing Patent Exclusivity in 2021
- Bottom Five States: % adults age 65 + receiving influenza vaccination in last 12 months
- 5 things to know about voters’ healthcare priorities, ACA awareness heading into 2018 elections
- Tina Koro: 7 rules to making mHealth messaging meaningful
Login or register to post comments