IoT
Comments
Texas Hospital Discloses Huge Breach
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
David F. Carr
50%
50%
David F. Carr,
User Rank: Author
2/5/2014 | 2:43:18 PM
Standard bureaucratic language?
Is that just standard bureaucratic language to say our system was breached and the hackers had full access to all this data ... but we're just not sure they actually took any of it.

Is there some example of where hackers gained that kind of access and didn't take advantage of it? Like the Grinch seeing the light and putting all the presents back neatly in their place?
<<   <   Page 2 / 2


Register for InformationWeek Newsletters
White Papers
Current Issue
How to Knock Down Barriers to Effective Risk Management
Risk management today is a hodgepodge of systems, siloed approaches, and poor data collection practices. That isn't how it should be.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.