Healthcare has recently been the target of a storm of data breaches, many of which are targeted through malicious campaigns and Advanced Persistent Threats. Healthcare organizations are a common target due to many factors – their security posture is often limited, they carry disparate and sensitive patient information, and encryption and security controls are frequently absent. This “Quickcast” outlines some of the prevalent threats that healthcare organizations face, how advanced threats pose a risk, and how organizations can create a stronger defensive posture against these emerging and insidious attacks.
Today’s advanced threats are more organized, sophisticated, and harder to detect than ever before. Higher education institutions can be the target of advanced threat actors --- in part because of the large amount of private information their networks often contain. To help you better understand advanced threats, how they are impacting higher education, and what you can do to prepare your institution, we’ve created this “Quickcast” video that provides an excellent overview in less than ten minutes.
Consumers are increasingly demanding new services, such as mobile commerce and expanded online shopping capabilities. At the same time, new threats, vulnerabilities and attack methods emerge every day. Today’s advanced threats are smarter, more organized, and harder to detect than ever before. Retail organizations can be the target of advance threat actors --- in part because of the large numbers of payment card account numbers retail networks often contain. To help you better understand advanced threats, how they are impacting retailers, and what you can do to be better prepared, we’ve created this “Quickcast” video that provides an excellent overview in less than ten minutes.
The PCI DSS Wireless Guidelines released in 2011 require merchants to implement additional security controls to address threats. The updated guidelines include recommendations on testing and detecting rogue wireless access points and devices, developing and enforcing policies, and other security considerations. To help you understand the requirements and assess their impact on your security and compliance program, we’ve created a 10-minute “quickcast” video presentation.
There are now an estimated 700,000+ mobile applications in use and the number is growing every day. Ensuring that mobile apps are secure --- and do not inadvertently create vulnerabilities that can be exploited by criminals --- has not received the level of attention it needs. We've identified 10 best practices for security in mobile application development, and cover them in a 10-minute presentation.
The FFIEC security guidelines released in late 2011 require financial institutions to implement additional security controls to address threats. The new guidance has impact on risk assessments, layered security and customer threat awareness. This brief video presentation will help you understand the changes and assess their impact on your security program.
Despite the healthcare industry's attempts to focus on regulatory compliance, the frequency of data breaches continues to rise at an alarming rate, according to a recent study. The explosion of mobile device usage has increased the risk of breaches, while the regulatory environment and the desire for data sharing have intensified the consequences. This brief video presentation will help you understand how and why data breaches occur, what can be done to prevent them, and how Dell SecureWorks addresses some of the most common security concern.
If your organization is planning to adopt Meaningful Use to gain Medicare and Medicaid EHR incentive payouts, avoid penalties, or build a stronger security position, you probably have questions about how to meet the measure. In this 10-minute presentation, you will learn what Meaningful Use means to your organization, and how Dell SecureWorks can help your organization build a stronger risk posture and avoid fines and penalties.
Financial Institutions have been spending heavily on network security for years, but several new and ongoing factors are accelerating the trend, including a new category of security risks classified as advanced threats. Today's well-resourced cybercriminals use a variety of techniques, tactics and procedures to reach specific targets or objectives. To help you understand the impact that advanced threats can potentially have on your information security strategy, we've created this "quickcast" video presentation that provides an excellent overview in less than 10 minutes.
By completing this form you'll be opting in to receiving future communications about products and services from Dell SecureWorks.