Healthcare Information Security
  • A Practical Guide to Healthcare Disaster Recovery Planning

    December 2, 2016 - This year, healthcare has been hit by multiple cyber events that have demonstrated the importance of and just how critical contingency planning is to providing care. Furthermore, massive DDoS attacks using the thousands of IoT devices connected to the internet as attack platforms show how critical healthcare disaster recovery planning can be. Regardless the reason or the method when a cyber...

  • IDC Predicts Healthcare Ransomware Attacks to Double by 2018

    November 29, 2016 - Numerous industries have been working to combat, prevent, and mitigate malicious malware attacks. The healthcare sector has found itself particularly vulnerable to such attacks, and research has shown that the number of healthcare ransomware attacks often outweighs other industries. Unfortunately, the latest IDC FutureScape predictions for healthcare IT does not show a change in this trend,...

  • Simplifying the Healthcare Data Center Migration Process

    November 23, 2016 - In working with some of the largest healthcare organizations in the world, there has been a common theme when conversations around healthcare data centers come about. Specifically, many organizations are now asking: Just how agile is my data center and all of the components within? What if I need to extend my platform into the cloud? Most of all, healthcare administrators are looking for way...

  • Protect Healthcare Data with User Training, Secure Systems

    November 21, 2016 - As covered entities and business associates of all sizes work to protect healthcare data, there are numerous aspects to consider, especially as cybsecurity threats continue to evolve and become more sophisticated.  We often focus on major security incidents, their impacts, and what this means for the industry. Today, security breaches are happening at alarming rates where attackers are...


Today's Top Stories

DHS Releases Internet of Things Security Principles

The Department of Homeland Security (DHS) released a set of principles last month to help organizations as they work to ensure Internet of Things (IoT) security through the process of creating and then using connected devices. Titled, “Strategic...

Malware Most Common Smart Hospital Data Security Threat

Malware is the most common type of potential attack scenario for smart hospitals that poses a data security threat, according to a recent study from the European Union Agency for Network and Information Security (ENISA). Smart hospitals have...

Strong Cybersecurity Measures Need Security in IoT Devices

The National Institute of Standards and Technology (NIST) recently published guidelines on how organizations can utilize cybersecurity measures for IoT devices, and underlined the importance of ensuring that security systems are built directly...

EHR Contingency Plans Part of OIG 2016 Health IT Focus

The Office of Inspector General (OIG) explained in its recent semiannual report to Congress how reviewing EHR contingency plans in healthcare organizations and wireless penetration tests of select CMS data centers were key areas of health IT...

A Practical Guide to Healthcare Disaster Recovery Planning

This year, healthcare has been hit by multiple cyber events that have demonstrated the importance of and just how critical contingency planning is to providing care. Furthermore, massive DDoS attacks using the thousands of IoT devices connected...

HIPAA Privacy Changes Not in Recent 21st Century Cures Act

The House of Representatives passed the 21st Century Cures Act yesterday with a vote of 392 to 26. This latest version of the legislation did not include wording that could have made it possible to change the HIPAA Privacy Rule and potentially...

PHI Data Breach Stems from Computer Hacking at GA Entity

Georgia-based Vascular Surgical Associates recently announced on its website that it had experienced a PHI data breach after one of its computer servers was accessed by an outside party. The incident happened around the time of a software update,...

View all stories

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks