DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Uncategorized

Your Mobile Device and Health Information Privacy and Security

Posted on December 29, 2012 by Dissent

In light of a recent blog post about nurses using their own smartphones to enter clinical data, I thought this might be a good time to point readers to HHS’s recent resources for securing mobile devices.  Their top tips: 1. Use a password or other user authentication 2. Install and enable encryption 3. Install and activate remote wiping…

Read more

Kroll Advisory Solutions Releases 2013 Cyber Security Forecast

Posted on December 29, 2012 by Dissent

Right before the holidays, Kroll Advisory Solutions released its predictions and advisory. They identified four unexpected cyber forces to be reckoned with in 2013 and offered some recommendations for addressing them: 1. Vampire Data: Organizations Get Bitten by the Data They Never Knew They Had Data exists in myriad locations and in a multitude of formats…

Read more

Out with the old, in with the new

Posted on December 28, 2012 by Dissent

As 2012 draws to a close, there are a gadzillion things I should be doing. Instead, I’m re-doing some of my blogs and moving them to a more privacy-friendly web hosting service. Hostgator never answered my questions about their privacy policy and their notice to users, so goodbye to them. This site was just moved to its…

Read more

Out with the old, in with the new

Posted on December 28, 2012 by Dissent

As 2012 draws to a close, there are a gadzillion things I should be doing. Instead, I’m re-doing some of my blogs and moving them to a more privacy-friendly web hosting service. Hostgator never answered my questions about their privacy policy and their notice to users, so goodbye to them. Within the next few days, DataBreaches.net will…

Read more

Health-care sector vulnerable to hackers (and other security problems), researchers say

Posted on December 26, 2012 by Dissent

This will come as absolutely no surprise to regular readers of this blog, but The Washington Post has published the results of an investigation into security in the healthcare sector, and the results are… well, what I’d expect. The article is instructive for the range of problems it covers and some real-world examples. Many of…

Read more

Nurses turning to un-authorized smartphones to meet data demands

Posted on December 24, 2012 by Dissent

John Cox reports: A new study finds that more than two-thirds of nurses are using their personal smartphones for clinical communications. Yet 95% of nurses in the sample say hospital IT departments don’t support that use for fear of security risks. The report, “Healthcare without Bounds: Point of Care Computing for Nursing 2012,” by Spyglass Consulting Group, points to the…

Read more
  • Previous
  • 1
  • …
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • …
  • 412
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Lower Merion School District says a data breach was caused by a computer glitch
  • After $1 Million Ransom Demand, Virgin Islands Lottery Restores Operations Without Paying Hackers
  • Junior Defence Contractor Arrested For Leaking Indian Naval Secrets To Suspected Pakistani Spies
  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • Class action settlement following ransomware attack will cost Fred Hutchinson Cancer Center about $52 million
  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Fears Grow Over ICE’s Reach Into Schools
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.