Hospitals lack staff needed to combat cyber attacks

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Nov 22, 2016
Featured Image

Best small to midsized cities to land a cybersecurity job

These are the best small to medium-sized cities for landing a job in the security sector, according to CyberSeek, a new data-driven heat map from CompTIA that provides real-time insight on the cybersecurity job market. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Hospitals lack staff needed to combat cyber attacks
Stocking Stuffer Ideas, Deals and Discounts - Deal Alert
Does security awareness training need a new, stronger name?
Supporting inclusivity in the office

White Paper: RSA

Achieving High Fidelity Security: An EMA White Paper

Discover the key facets of high-fidelity security - the ability for organizations to collect comprehensive and timely data and gain context for fast and prioritized threat detection and response. Learn about the benefits of combining network and endpoint data with a strong analytic toolset. Read this analyst report for more details about a successful security monitoring program and insights for making your security team more effective. Read More

Thumbnail Image

Hospitals lack staff needed to combat cyber attacks

healthcare sector number one cyber attacked industry has a workforce shortage Read More

Thumbnail Image
DealPost

Stocking Stuffer Ideas, Deals and Discounts - Deal Alert

Here we've compiled a list of great techie stocking stuffer ideas that are reasonably priced, highly rated, and deeply discounted. Read More

Thumbnail Image

Does security awareness training need a new, stronger name?

Security awareness training can help change the security culture through ongoing attention on relevant topics like social engineering. Nevertheless, stale, old, awareness material certainly doesn’t help and too many programs keep doing the same thing and expect a different result. Read More

Thumbnail Image

Supporting inclusivity in the office

Many organizations are trying to change the limited demographic of people working in technology, but some are finding the process difficult. Here are a few tips for improving your efforts to hire and retain a wider variety of people. Read More

White Paper: Ping Identity Corporation

Best Practices for Securing the Modern Digital Enterprise

While active and explicit authentication may be the norm today, this is changing. Contextual authentication is moving from a complementary additive, to a necessity. Read More

Top 5 Stories

1. Malicious images on Facebook lead to Locky Ransomware
2. Ransomware victims able to thwart attacks, report says
3. 10 top holiday phishing scams
4. Report: Surveillance cameras most dangerous IoT devices
5. Enjoy your malware, sucker!

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.