Healthcare Information Security

Cybersecurity News

Healthcare Cybersecurity Knowledge Gaps in Phishing Awareness

by

There is a need for both simulated phishing attacks and question-based evaluations to ensure that healthcare cybersecurity measures are able to protect sensitive data, according to a recent survey. The Wombat Beyond the Phish Report found that...

CHIME Member Leads Healthcare Cybersecurity Task Force

by

Creating a set of recommendations that anyone in the healthcare industry can utilize is one of several goals for the federal healthcare cybersecurity task force, according to co-chair and CHIME board member Theresa Meadows, R.N., CHCIO. Meadows...

A Hacker’s Perspective on Strengthening Healthcare IT Security

by

In today’s connected world most of us are frantically trying to protect our, or our organization’s, critical data and systems. Despite a couple of decades of constant advancements in IT security, there seems to be even more risks...

Cybersecurity Attacks Leading Large Health Data Breach Cause

by

While the summer of 2016 is quickly coming to an end, covered entities and their business associates cannot ease up on their data security measures. If the past three months have been any indication, large health data breaches are not about to...

How FTC Data Security Aligns with NIST Cybersecurity Framework

by

The NIST Cybersecurity Framework (CSF or The Framework) aligns with how FTC data security measures are outlined, according to a recent FTC blog post. Specifically, “the alleged lapses the FTC has challenged through its law enforcement actions...

Can SSL Decryption Prevent Healthcare Data Breaches?

by

Utilizing data encryption methods is often touted as a way to prevent healthcare data breaches, as it could help prevent sensitive information from being easily accessible. Preventing and even preventing network attacks should be a top priority...

ONC Blockchain Challenge Winners Emphasize Data Security

by

ONC blockchain challenge winners were announced earlier this week, with the top white papers focusing on recommendations for market viability and creativity, as well as the advancement of health information flow. There were more than 70 submissions,...

St. Jude Disputes Alleged Medical Device Security Issues

by

St. Jude Medical Center recently responded to allegations that medical device security flaws exist in its pacemakers and other heart devices, calling the accusations “false and misleading.” Muddy Waters Capital LLC released a report...

How to Build a Strong Healthcare Information Security Team

by

With cybersecurity threats seemingly evolving each day, healthcare providers can no longer afford to have incomplete approaches to data security. Having a comprehensive and well-trained healthcare information security team will be a key aspect...

Protecting Against Unauthorized Healthcare Data Access

by

No healthcare organization wants to receive notification that there has been unauthorized healthcare data access at the company. Not only could this potentially expose patient information, but it could result in potential fines for the organization...

Will Privileged User Abuse Affect Healthcare Data Security?

by

Employee access is a key aspect of healthcare data security, and healthcare organizations of all sizes need to ensure that their administrative safeguards account for the type of information employees view, use, or transfer. A recent Ponemon...

Prevent Healthcare Phishing by Strengthening Employee Training

by

Cyber criminals view the healthcare industry as a prime target. Just this year, we have witnessed hospitals like Hollywood Presbyterian Medical Center, MedStar Health’s Union Memorial Hospital, in Baltimore, Maryland, and Methodist Hospital...

Why Healthcare Ransomware Attacks Can Be More Damaging

by

It should come as no surprise that one of the main reasons the healthcare industry is a prime target for ransomware attacks is because of the sensitive information - PHI and PII - it holds. However, a recent survey found that healthcare ransomware...

Data Security Vulnerabilities Found in CMS Wireless Networks

by

While the Centers for Medicare and Medicaid Services (CMS) has effective security controls in place to prevent cybersecurity attacks, some data security vulnerabilities were found in its wireless networks, according to a recent Office of Inspector...

Healthcare Cybersecurity Efforts Improving, Still Need Work

by

Ransomware, advanced persistent threats (APTs), and phishing attacks are the top most feared threats in healthcare cybersecurity, according to a recent HIMSS survey. While the majority of organizations have made efforts to prioritize their information...

Utilizing Administrative Safeguards to Prevent Insider Threats

by

Preventing healthcare insider threats needs to be a top priority for covered entities of all sizes, and with cybersecurity threats evolving each day, training methods must also remain current. Administrative safeguards, including user training...

5 Next-Generation Healthcare Security Solutions

by

The modern healthcare data center has truly evolved. We’re now seeing the emergence of a truly interconnected healthcare technology ecosystem spanning numerous heterogeneous IT platforms. Throughout all of this, security continues to play...

HITRUST Aids Small Orgs in Healthcare Cybersecurity Threats

by

Smaller healthcare organizations, specifically physician practices with less than 75 employees, can have difficulties in preparing against the evolving healthcare cybersecurity threats. That is why HITRUST and the North Texas-based health system...

How Location-Based IT Could Re-invent Healthcare Security

by

We have entered an age where our private data has become an all-too-easy target for malicious individuals or organizations who steal and sell this data for significant profit. Healthcare security is especially important as a hacker made almost...

Possible Microsoft Data Security Flaw Revealed in ‘Golden Key’

by

Healthcare organizations relying on Microsoft operating systems may want to take note of a recent potential data security issue, and make any necessary patches to ensure that patient information remains secure. Researchers MY123 and Slipstream...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks