Vendor Management

KLAS Highlights Top Security, Privacy Solutions This Year

February 8, 2024 - KLAS Research recognized several leading security and privacy vendors as Best in KLAS winners for 2024. The 2024 Best in KLAS software and services winners were designated based on information collected from more than 26,000 evaluations collected over the past year from more than 5,000 healthcare organizations. The Best in KLAS designation...


More Articles

KLAS: AI, Market Consolidation Impact Patient Privacy Monitoring Vendor Trends

by Jill McKeon

Patient privacy monitoring solutions help healthcare organizations manage privacy risks and detect unauthorized access to patient data, playing a crucial role in compliance and patient confidentiality....

Revenue Cycle Management Company Reports Healthcare Data Breach Impacting 250K

by Jill McKeon

Revenue cycle management company Reventics recently notified 250,918 individuals of a healthcare data breach that impacted some patient information. Reventics detected a cyber intruder within its...

Top Healthcare Cybersecurity, IoT, Privacy Vendors Achieve Best in KLAS Status

by Jill McKeon

Duo, Imprivata, and Medigate by Claroty, were among the variety of vendors that achieved “Best in KLAS” status in the newly released 2023 Best in KLAS: Software & Services...

Healthcare CISOs Form Health3PT Council to Improve Third-Party Risk Management

by Jill McKeon

More than 20 healthcare leaders have come together to form the Health 3rd Party Trust (Health3PT) Initiative and Council, aimed at introducing new standards, automated workflows, and assurance models...

KLAS Evaluates Healthcare Cybersecurity, Data Privacy Consulting Vendors

by Jill McKeon

More healthcare organizations are engaging with healthcare cybersecurity and data privacy consulting vendors to help mitigate risk and avoid the numerous repercussions of healthcare cyberattacks, data...

Healthcare Orgs Continue to Report Impacts Of Recent Third-Party Data Breaches

by Jill McKeon

Third-party data breaches are continuing to overwhelm the healthcare sector, based on the current state of the HHS Office for Civil Rights (OCR) data breach portal. As organizations continue to report...

Is the Proliferation of Cybersecurity Vendors Helping or Hurting Healthcare?

by Jill McKeon

A proliferation of cybersecurity vendors have entered the market in recent years hoping to alleviate security and privacy concerns across the healthcare sector. At the 2nd Annual HealthITSecurity Virtual Summit, Michael Carr, system vice...

CT Health Insurance Exchange Failed to Report 44 Breaches, Audit Finds

by Jill McKeon

A state audit discovered that the Connecticut Health Insurance Exchange, known as Access Health CT,  failed to report 44 data breaches to the auditors of public accounts and the state comptroller...

KLAS: Evaluating Top Healthcare IoT Security Vendors

by Jill McKeon

Medigate, Ordr, and Armis are among the most considered and adopted healthcare Internet of Things (IoT) security vendors in 2022, according to a new KLAS report. Healthcare IoT solutions can help...

Navigating The Highly Saturated Healthcare Cybersecurity Market

by Jill McKeon

As cyberattacks increase, the healthcare cybersecurity market is being inundated with new vendors and solutions. Navigating the highly saturated healthcare cybersecurity market can be difficult, especially with a limited budget and a vast...

3 Keys to Third-Party Risk Management at WellSpan Health

by Jill McKeon

Third-party risk management is a crucial tenet of WellSpan Health’s cybersecurity infrastructure. The South-Central Pennsylvania integrated health system engages with thousands of vendors, 30,000 endpoints, and 26,000 users, a fifth...

Third-Party Vendor Ransomware Attack Impacts Humana, Anthem Members

by Jill McKeon

Both Humana and Anthem began notifying members that their protected health information (PHI) had been exposed following a ransomware attack on billing and IT solutions vendor PracticeMax. Humana and...

Healthcare Organizations Deprioritize Third-Party Risk Management

by Jill McKeon

Organizations across all sectors constantly share confidential information with third parties, but current third-party risk management strategies may leave organizations extremely vulnerable to...

Phishing Attack on Five Rivers Health Impacts Data of 156K Patients

by Jessica Davis

Ohio-based Five Rivers Health Centers recently notified 155,748 patients that their personally identifiable and health information was breached after a two-month long email compromise last year,...

GAO: Insurers Limiting Coverage in Attack-Laden Sectors, Like Healthcare

by Jessica Davis

A recent Government Accountability Office report shows that industries experiencing an onslaught of cyberattacks, like healthcare, may face another concerning challenge: Some cyber insurers...

Critical Infrastructure Attacks: Threat Landscape Forces Security to Evolve

by Jessica Davis

Over the last year, there’s been a decided shift in the threat landscape in terms of impact and frequency. From crippling outages at Colonial Pipeline and Scripps Health, to the rise in double...

NIST, CISA Share Software Supply Chain Attack Defense Guidance

by Jessica Davis

NIST and the Department of Homeland Security Cybersecurity and Infrastructure Security Agency released guidance to support entities with the defense against supply chain attacks, in the wake of the...

Healthcare’s Biggest Cybersecurity Blind Spots and Misconceptions

by Jessica Davis

Threat actors are moving at a drastic pace and with stealthy tactics able to hide their activities from system administrators. The truth is that healthcare is struggling with some massive cybersecurity...

H-ISAC Supply-Chain Insights Aim to Prevent Next SolarWinds Cyberattack

by Jessica Davis

The Health-ISAC recently published supply-chain cyberattack insights in collaboration with the American Hospital Association, meant to support healthcare provider organizations prevent and respond to...