article thumbnail

How to Combat Ransomware: Q&A with a Healthcare CISO

Pure Storage

Littman helped build a world-class infrastructure for Kelsey-Seybold Clinic based on Pure Storage® FlashBlade® to ensure medical records and data are always available to the healthcare workers who support the patients of this large, multi-specialty clinic system serving the Houston area. There hasn’t been much looking back that I regret.

article thumbnail

Managing the Perils of Data Exfiltration

Pure Storage

healthcare industry , sensitive patient data was exfiltrated from a UnitedHealth subsidiary that processes prescriptions for over 100 million patients. A common technique is to hack into a worker’s email and use that access to impersonate that worker in sending an email to colleagues that’s loaded with malware links.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Managing the Perils of Data Exfiltration

Pure Storage

healthcare industry , sensitive patient data was exfiltrated from a UnitedHealth subsidiary that processes prescriptions for over 100 million patients. A common technique is to hack into a worker’s email and use that access to impersonate that worker in sending an email to colleagues that’s loaded with malware links.

article thumbnail

What Is Wiperware? 10 FAQs

Pure Storage

10 FAQs by Pure Storage Blog Wiperware, or wiper malware, is a disturbing evolution in cyber warfare that takes no prisoners—not even your data. Attacks attributed to this new, highly destructive form of malware include an Iranian train system attack in 2021 that caused “unprecedented chaos.” What Is Wiperware?

Malware 52
article thumbnail

Four Key Backup and Recovery Questions IT Must Ask During Deployment

Solutions Review

A solid backup system also reduces the pressure on the organization’s other security tools, providing another layer of defense if malware gets through its firewall or other security controls. Most IT professionals know they should be prioritizing DR/backup, but many don’t in practice.

Backup 105
article thumbnail

Strategies for Digital Risk Protection

Reciprocity

Digital risk protection (DRP) refers to cybersecurity measures that aim to prevent data breaches, malware, identity theft, and other forms of cyber crime. Any hazards associated with cloud architectural changes, the use of new platforms such as IoT devices, or new IT systems can lead to digital risk. What is Digital Risk Protection?

article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

A SCADA system can be found in an extensive range of industries, including: Agriculture Healthcare Nuclear Reactor Transportation Energy Sector Civil and Chemical Engineering Water Plant Research What is the impact of the loss of SCADA or process control systems? Architecture and security of SCADA systems: A review. & MANIMARAN, G.,