![This Week Health: Newsroom artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts124/v4/f3/9e/53/f39e531c-c562-34d7-a181-299c4fe77fa7/mza_18013758480359272458.jpg/100x100bb.jpg)
Human Error Still Top Cause of Security Breaches
This Week Health: Newsroom
English - September 22, 2021 21:46 - 7 minutes - 6.79 MB - ★★★★★ - 5 ratingsMedicine Health & Fitness Technology health it healthcare technology cio cmio interoperability news Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Human error has been the source of most breaches since I can remember. What can be done about it?
FTA
The threat intelligence player drew on multiple data sources, including dark web analysis, pen-testing data, incident response cases and threat intelligence to compile the https://www.ibm.com/downloads/cas/WMDZOWK6 (2021 IBM Security X-Force Cloud Threat Landscape Report.)
It revealed that attackers are actively looking to exploit weaknesses in enterprise protection, many of which come about due to human error.
To this end, over half of breaches came about as a result of shadow IT, when systems were spun up without being subject to corporate security policy — and therefore lacked vulnerability and risk assessments and hardened security protocols.
Additionally, two-thirds of the incidents studied involved improperly configured APIs.
----
https://www.infosecurity-magazine.com/news/misconfigured-apis-cloud-breaches/ (https://www.infosecurity-magazine.com/news/misconfigured-apis-cloud-breaches/)
#healthcare #cio #cmio #healthIT #chime #himss
Human error has been the source of most breaches since I can remember. What can be done about it?
FTA
The threat intelligence player drew on multiple data sources, including dark web analysis, pen-testing data, incident response cases and threat intelligence to compile the 2021 IBM Security X-Force Cloud Threat Landscape Report.
It revealed that attackers are actively looking to exploit weaknesses in enterprise protection, many of which come about due to human error.
To this end, over half of breaches came about as a result of shadow IT, when systems were spun up without being subject to corporate security policy — and therefore lacked vulnerability and risk assessments and hardened security protocols.
Additionally, two-thirds of the incidents studied involved improperly configured APIs.
----
https://www.infosecurity-magazine.com/news/misconfigured-apis-cloud-breaches/
#healthcare #cio #cmio #healthIT #chime #himss