Quantcast
Channel: fbi – Insurance Thought Leadership
Browsing latest articles
Browse All 14 View Live

Why Medical Records Are Easy to Hack

If hacked credit and debit card account numbers are like gold in the cyber underground, then stolen healthcare records, containing patient information, are like diamonds. Private details such as Social...

View Article



Unstructured Data: New Cyber Worry

Companies are generating mountains of unstructured data and, in doing so, unwittingly adding to their security exposure. Unstructured data is any piece of information that doesn’t get stored in a...

View Article

Rising Risks of Medicare Audits

Texas physician Dennis B. Barson Jr. and his medical clinic administrator are headed to prison. The 10-year prison sentence imposed against Barson, like an $8 million-plus healthcare fraud civil...

View Article

The Biggest Medicare Fraud Cases of 2015

Medicare does not keep records of how much it loses annually because of fraud, but the FBI, which oversees the investigation and prosecution of those alleged to have participated in fraud, estimates...

View Article

Image may be NSFW.
Clik here to view.

Has an International Cyber War Begun?

Cyber attacks were once on the periphery of American business consciousness. That mindset changed over the past two years. A series of devastating events, including the 2014 cyber attack against Sony,...

View Article


Apple v. FBI: Inevitable Conflicts on Tech

The battle between the FBI and Apple over the unlocking of a terrorist’s iPhone will likely require Congress to create legislation. That’s because there really aren’t any existing laws that encompass...

View Article

Image may be NSFW.
Clik here to view.

IRS Is Stepping Up Anti-Fraud Measures

The Internal Revenue Service is taking as long as 21 days to review tax returns, according to research from fraud prevention vendor iovation, a clear sign that Uncle Sam has stepped up anti-fraud...

View Article

Hacking the Human: Social Engineering

Virtually every business relies on a network to conduct its daily operations. This often involves the collection, storage, transfer and eventual disposal of sensitive data. Securing that data continues...

View Article


Image may be NSFW.
Clik here to view.

Why Small Firms Need Cyber Coverage by Harris Tsangaris

There’s barely a week that goes by without some sort of cyber security incident — a system hack, a data breach, putting thousands if not millions of people’s personal information at risk. Although big...

View Article


Image may be NSFW.
Clik here to view.

New Idea for Active Shooter Incidents by Jeffrey Ellis

Active shooter events in the U.S., unfortunately, are becoming more frequent — so much so that the Wall Street Journal reported this week that school districts are stepping up purchases of insurance...

View Article
Browsing latest articles
Browse All 14 View Live


Latest Images