Phish Stories: Big, Bad, and Sadly, True

My grandfather was a fisherman. He left home when he was just a young boy, hitched across the country, joined the Merchant Marines, and spent his teenage years aboard a fishing trawler in the Bering Sea. When I was growing up, he’d put me to bed by telling some of the wildest, craziest fish stories…

Top 5 Uses of Biometrics in Healthcare

“I can tell by your voice harmonics that you’re badly upset Dave. Why don’t you take a stress pill and get some rest?” HAL, the Heuristically Programmed Algorithmic computer in 2001: A Space Odyssey used voice recognition and artificial general intelligence in some of that movie’s most memorable scenes. But what was so futuristic 50…

Never Too Small to Lose the Security War

  Healthcare organizations will spend more money on IT security in 2018 than ever before. But the statistics suggest these cybersecurity warriors may be taking one step forward and two steps back. Comparing U.S. Department of Health and Human Services HIPAA violation data for calendar year 2017 versus unofficial tallies year to date, it would…

IoMT: Keep Up or Clean Up

When your smart thermostat fails, your home may get a little overheated. The breach of a security camera might result in a break in or a stolen package off the front porch. But failure of an Internet-connected heart monitor or the hacking of a device configured to remind an elderly patient to take their hypertension…

Phishing: Don’t Get Hooked!

“Gone fishin.” It’s easy to let your mind wander as winter turns to spring and the sun extends that perfect invitation to get out of the office and forget about life for a while. And then you glance back at your computer screen. “Gone phishing.” Your spam folder is filled with get rich quick schemes,…