Healthcare Information Security
  • 26% of Orgs Would Pay Ransomware After Healthcare Cyberattack

    November 14, 2017 - While the majority of healthcare IT and security professionals in the UK and US are confident in their organization’s ability to respond to a healthcare cyberattack, there are still some that are not sure their entity can properly respond, according to a recent survey. Twenty-three percent of UK healthcare IT professionals said they are not confident in their organization’s ability...

  • How Secure Messaging, Texting Benefit Healthcare Providers

    November 13, 2017 - As cybersecurity threats continue to evolve and impact the healthcare industry, it is essential that providers are able to maintain communications to ensure patients receive necessary care. Healthcare secure messaging and secure texting are quickly becoming a top option to send information while still keeping sensitive data secured. Nearly three-quarters of the American Hospital Association’s...

  • Data Backups Aid in Ransomware Attack Recovery for KS Agency

    November 9, 2017 - East Central Kansas Area Agency on Aging (ECKAAA) said in an online statement that it was the victim of a ransomware attack on September 5, 2017, leaving files encrypted and inaccessible. ECKAAA said it immediately hired a cybersecurity company to investigate the incident, and learned that a variant of the Crysis/Dharma ransomware had affected the facility. “The ransomware only affected...

  • Secure Health Data Exchange Key Focus for AMA Investment

    November 6, 2017 - The nationwide push for interoperability has helped fuel the desire for healthcare to find ways to implement secure health data exchange. Information should be able to flow freely, but data security concerns can be a great hindrance in entities wanting to connect to other organizations or join exchange networks. Healthcare needs more tools and more capabilities to properly mobilize, according...


Today's Top Stories

Healthcare Endpoint Attacks Cost the Industry $1.3B Annually

Preparing for potential healthcare endpoint attacks should be a top priority for covered entities, especially with a recent survey showing that organizations believe that an over-reliance on traditional endpoint security is leaving entities exposed....

Evolving Cybersecurity Threats, Protecting Data Top HHS Challenges

Adequately addressing the industry’s current cybersecurity threats is a key aspect to one of the major management and performance challenges for HHS, the Office of Inspector General determined in its annual report. OIG’s 2017 Top...

Catholic Charities Healthcare Cyberattack Impacts 4.6K

Catholic Charities announced that its Glens Falls office experienced a healthcare cyberattack on a server containing information of approximately 4,600 current and former clients and several employees. Unauthorized software was discovered on...

AHIMA Notes Cybersecurity Prep, HIPAA Compliance as Focus Areas

All healthcare organizations can work on improving their privacy and security by focusing on their cybersecurity preparation, HIPAA compliance, and staying people-oriented, according to a recent blog post on the Journal of AHIMA. AHIMA’s...

26% of Orgs Would Pay Ransomware After Healthcare Cyberattack

While the majority of healthcare IT and security professionals in the UK and US are confident in their organization’s ability to respond to a healthcare cyberattack, there are still some that are not sure their entity can properly respond,...

HIPAA Info Included in Updated MD Data Breach Notification Law

Maryland has updated its data breach notification law, with information protected under HIPAA to be included under the definition of personal information. Should that data be compromised in a data breach, state organizations will need to notify...

CareFirst Data Breach Case Moves to US Supreme Court

A petition for writ of certiorari was recently filed with the US Supreme Court, pushing the CareFirst data breach case forward. CareFirst wants its case reviewed, which could potentially reignite the debate over how plaintiffs need to establish...

View all stories

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks