Is Your Small Business Safe From Cyberattacks?

Of the 855 data breaches Verizon examined in its 2012 Data Breach Investigations Study, 71 percent occurred at businesses with fewer than 100 employees. The Association of Certified Fraud Examiner finds the median small business loss due to fraud to be $200,000. These losses can be prevented with better protection and more knowledge about fraud […]

Out of control with BYOD in your hospital?

The number of bring your own device (BYOD) workplaces is increasing. Hospitals are certainly no exception with nursing staff, doctors and contractors bringing their own mobile devices into the hospital – and in many cases, jacking into WiFi networks in the hospital premises. With mobile access points via  your smart phone – you don’t even […]

What is your take on anti-virus in medical devices?

A check-box IT requirement for medical devices on the hospital network is installation of anti-virus software even though most devices don’t have network connectivity and as a result are running outdated AV engine and  signatures.  What is your take? Should device vendors continue to install anti-virus even though it’s not effective? Would you considering using […]

Why anti-virus doesn’t work for medical devices

Are you checking off medical device security in your hospital with anti-virus:  falling for security theater; feeling secure and enjoying the show,  but in fact being less secure? A medical device is not an office PC The most commong security countermeasure in use today is anti-virus software for Windows-based workstations  to protect the Windows PC from […]

How to Save Your Data and Reputation if You Lose Your BlackBerry

5 years ago, an analysis we did of 150 data breach events showed that over 40% of the data breach events were due to stolen or lost hardware devices (Download the free research article on data breach here Business Threat Modeling Study). Stolen or lost devices were in a close second place to data being stolen […]

מלחמת סייבר – לתקוף את המרקם החברתי של האקרים ולא להתגונן

הפרדיגמה הצבאית קונבנציונלית אינה מתאימה לאבטחת סייבר מדיניות Cyber Security של מדינות שונות עוצבה בידי הצבא ולכן באופן מסורתיcyber security  נתפשת רק בהקשר של אסטרטגיית הגנה. אסטרטגיה זו מתבססת על איסוף מודיעין, ניתוח איומים וסיכונים, מידול וניטור יחד עם פרישה של טכנולוגיות הגנה כמו firewall, מניעת DDoS, מניעת חדירות ושימוש ב-honeypots. הבעיה בגישה מתגוננת כזו […]

4 steps to small business security

Software Associates specializes in security and compliance for biomed.  Many of our biomed clients are small 3-10 person startups working out of a small office and not having neither the IT budget nor the IT best practices to take care of their own network. According to the latest statistics from the FBI in their annual […]

Health Information Technology Patient Safety Action & Surveillance Plan

This is a quick update on two new documents released by the HHS and the IMDRF:  Health Information Technology Patient Safety Action & Surveillance Plan The US Department of Health and Human Services published on July 2, 2013 the Health Information Technology Patient Safety Action & Surveillance Plan. The FDA belongs to the HHS. The plan defines several […]

Why security defenses are a mistake

Security defenses don’t improve our understanding of the root causes of data breaches Why is this so? Because when you defend against a data breach – you do not necessarily understand the vulnerabilities that can be exploited. If do not understand the root causes of your vulnerabilities, how can you justify and measure the effectiveness of […]

Software in Medical Devices – Update

We have previously written about various aspects of the software development process, especially, the verification and validation activities in implanted and invasive medical devices. Here is  an update on what is happening in the regulatory arena and how the regulatory groups are checking up on what we are doing. Software Recalls 2012 The estimate for software recalls […]