Healthcare Information Security

Cybersecurity News

DoS, DDoS Attack Prevention Measures for Covered Entities

by

As healthcare continues to adopt Internet of Things (IoT) technology, denial-of-service (DoS) and distributed-denial-of-service (DDoS) attack prevention measures are becoming more prevalent, according to the latest cybersecurity newsletter from...

NIST Vulnerable Software Guide May Affect Health Data Security

by

A collection of strategies for reducing software vulnerabilities could potentially affect healthcare organizations that are looking to improve their health data security measures. National Institute of Standards and Technology (NIST) computer...

How Healthcare Cybersecurity Ties into Larger National Plan

by

Many findings from a recent report by the Commission on Enhancing National Cybersecurity have direct ties to the future of healthcare cybersecurity, according to Lee Kim, director of privacy and security for HIMSS North America. The Commission...

DHS Releases Internet of Things Security Principles

by

The Department of Homeland Security (DHS) released a set of principles last month to help organizations as they work to ensure Internet of Things (IoT) security through the process of creating and then using connected devices. Titled, “Strategic...

Malware Most Common Smart Hospital Data Security Threat

by

Malware is the most common type of potential attack scenario for smart hospitals that poses a data security threat, according to a recent study from the European Union Agency for Network and Information Security (ENISA). Smart hospitals have...

Strong Cybersecurity Measures Need Security in IoT Devices

by

The National Institute of Standards and Technology (NIST) recently published guidelines on how organizations can utilize cybersecurity measures for IoT devices, and underlined the importance of ensuring that security systems are built directly...

EHR Contingency Plans Part of OIG 2016 Health IT Focus

by

The Office of Inspector General (OIG) explained in its recent semiannual report to Congress how reviewing EHR contingency plans in healthcare organizations and wireless penetration tests of select CMS data centers were key areas of health IT...

A Practical Guide to Healthcare Disaster Recovery Planning

by

This year, healthcare has been hit by multiple cyber events that have demonstrated the importance of and just how critical contingency planning is to providing care. Furthermore, massive DDoS attacks using the thousands of IoT devices connected...

IDC Predicts Healthcare Ransomware Attacks to Double by 2018

by

Numerous industries have been working to combat, prevent, and mitigate malicious malware attacks. The healthcare sector has found itself particularly vulnerable to such attacks, and research has shown that the number of healthcare ransomware...

Healthcare Top Target in Gatak Ransomware Attacks

by

The healthcare industry is one of the most common victims of the Gatak ransomware attacks, according to research from Symantec. The Gatak Trojan will lead victims to a website that offers key generators for pirated software, and is the majority...

Healthcare Data Breaches, Ransomware Top Challenges in 2017

by

The healthcare industry will likely continue to be plagued by technological issues, such as healthcare data breaches and ransomware attacks, going into next year, according to recent predictions. The latest Black Book poll of healthcare PR clients...

US-CERT Updates Cybersecurity Incident Notification Guidelines

by

The U.S. Computer Emergency Readiness Team (US-CERT) announced its new cybersecurity incident notification guidelines, which will go into effect on April 1, 2017. The guidelines will affect all Federal departments and agencies, as well as state,...

House Subcommittee Talks Connected Device Cybersecurity Issues

by

While the connected devices industry is seeing intense growth with evolving technologies, it is also important to be aware of the current cybersecurity issues, according to a recent hearing held by the House Energy and Commerce Subcommittee....

Half of Businesses Report Ransomware Attack in Past Year

by

An increase in IT security spending and adjusting security strategies to focus on mitigation are two of the most common responses businesses listed after becoming the victim of a ransomware attack in the last year, according to a recent survey....

Protect Healthcare Data with User Training, Secure Systems

by

As covered entities and business associates of all sizes work to protect healthcare data, there are numerous aspects to consider, especially as cybsecurity threats continue to evolve and become more sophisticated.  We often focus on major...

Secure Exchange of Electronic Data Top HHS Challenge

by

The Department of Health and Human Services (HHS) is currently facing 10 management and performance challenges, including health information technology and the meaningful and secure exchange and use of electronic information, according to the...

OIG to Focus on HHS Information Security, Penetration Testing

by

The Office of Inspector General (OIG) plans to audit the Department of Health and Human Services (HHS) information security controls to track drug prescription reimbursements, according to the 2017 OIG work plan. HHS will also be subject to penetration...

NH-ISAC, MDISS Collaborate for Medical Device Cybersecurity

by

Three national organizations recently signed a Memorandum of Understanding (MOU) in an effort to improve medical device cybersecurity measures. The National Health Information Sharing and Analysis Center (NH-ISAC), the Medical Device Innovation,...

NIST Aims to Help Small Business Cybersecurity Measures Improve

by

While some small businesses may assume that they are not primary targets for cyber criminals, the National Institute of Standards and Technology (NIST) wants to ensure that those organizations are able to implement the necessary cybersecurity...

NY Can Still Improve Health Exchange Data Security Measures

by

The Office of Inspector General (OIG) determined in a recent investigation that New York did  implement health insurance exchange data security measures in its web site and database, but improvements must still be made to ensure that PII...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks