Tech | Crain's

Business news covering gadgets, electronics, innovation and the industry.

Safeguarding electronic medical records a top priority for doctors, hospitals

Dr. Alexis Wiesenthal, center, an internal medicine specialist from San Antonio, uses a tablet to review a patient's medical records. | Photo courtesy of the Texas Medical Association.

February 14, 2018 - 5:39pm

In this ongoing series, we ask executives, entrepreneurs and business leaders about mistakes that have shaped their business philosophy.

Stephanie Newby

Background:  

In this ongoing series, we ask executives, entrepreneurs and business leaders about mistakes that have shaped their business philosophy.

Cathy Atkins

Background:  

In this ongoing series, we ask executives, entrepreneurs and business leaders about mistakes that have shaped their business philosophy.

Steve Stencil

Background:  

In this ongoing series, we ask executives, entrepreneurs and business leaders about mistakes that have shaped their business philosophy.

Xerxes Cooper

Background:  

Texas companies tap local firms for cybersecurity protection

February 13, 2018 - 12:26pm

National model for fighting cybercrime based on Utah method of investigation

The Utah Department of Public Safety and the FBI work together to solve cybercrimes. The method the organizations use to investigate those crimes has been called the Utah Model, which is recognized nationally for cybercrime investigations, cyber intelligence analysis and the study of the impact of cybercrimes. | Logo courtesy of the Utah Department of Public Safety.

February 12, 2018 - 2:56pm

Cyberthreats demand ongoing vigilance, say Florida experts

UCF's student team bested their Ivy League peers at 2015's CyberSEED Social Engineering Challenge. | Photo courtesy of University of Connecticut

February 12, 2018 - 2:40pm

Lessons learned from ransomware attack on small Indiana hospital

Scott Shackelford is an associate professor of business law and ethics at the Indiana University Kelley School of Business, and serves as chairman of IU Bloomington’s cybersecurity program and director of the Ostrom Workshop Program on Cybersecurity and Internet Governance.

February 12, 2018 - 11:46am

Inside job: How to keep ex-employees from hacking into your business

A cyberattack upon Sacramento Regional Transit’s databases in November 2017 caused no lasting damage, but did raise the question of whether the hacker got inside help. | Crain National photo by Jim Watkins.

February 11, 2018 - 10:33pm

Pages