Healthcare Information Security

Endpoint Security

Massive SingHealth Data Breach Caused by Lack of Basic Security

January 10, 2019 - Singapore’s July 2018 personal data breach of 1.5 million SingHealth patients, including Prime Minister Lee Hsien Loong, was caused by bad system management, a lack of employee training, and other major flaws, according to the 454-page report released today by the investigation committee. The committee was formed shortly after the 2018 breach, which included the personal...


More Articles

User Authentication Most Common Cyber Risk for Hospitals, Health Systems

by Jessica Davis

User authentication deficiencies, endpoint leakage, and excessive user permissions are the three most common cyber risks facing health systems and hospitals, according to new data from Clearwater CyberIntelligence Institute. The...

Medical Devices and Other Endpoints Offer Attractive Targets to Attackers

by Insight

“Attackers see medical devices and other endpoints in the healthcare environment as rich targets,” explains Julie Connolly, principal cybersecurity engineer at MITRE. Connolly identifies several security problems with medical...

ICS-CERT Flags BeaconMedaes Medical Device Security Issues

by Fred Donovan

A recent ICS-CERT advisory warned about medical device security problems with the BeaconMedaes TotalAlert Scroll medical air systems. An attacker could exploit vulnerabilities in the Scroll medical air system web application to view and...

5 Critical Healthcare Data Security Implementations for Providers

by Bill Kleyman

I get the chance to work with smaller clinics and very large healthcare providers. If you hide the name and the size of the organization, many of them share very similar security concerns. The good news is that innovation in the healthcare...

Healthcare Industry Takes Brunt of Ransomware Attacks

by Fred Donovan

The healthcare industry is taking the lion’s share of ransomware attacks, according to a threat report released May 1 by endpoint security firm Cylance. Ransomware attacks grew three-fold last year, with healthcare being affected...

4 Tips to Locking Down, Securing Healthcare BYOD

by Bill Kleyman

We are a connected world. Furthermore, our level of connectedness will only continue to increase. And, this is becoming even more so the case when we look at healthcare. A recent CITO Research study showed that leveraging apps and mobile...

Healthcare Endpoint Attacks Cost the Industry $1.3B Annually

by Elizabeth Snell

Preparing for potential healthcare endpoint attacks should be a top priority for covered entities, especially with a recent survey showing that organizations believe that an over-reliance on traditional endpoint security is leaving...

How Healthcare Orgs Can Implement Strong End-User Security

by Elizabeth Snell

End-user security is a critical aspect to overall health data security, especially as more organizations are implementing technologies allowing employees to be mobile. HIMSS Privacy and Security Director Lee Kim JD, CISSP, CIPP/US, FHIMSS...

Securing Endpoint Devices from Healthcare Ransomware Threats

by Elizabeth Snell

More healthcare organizations are implementing mobile devices and opting for BYOD strategies to help strengthen communication capabilities. However, the increase in endpoint devices has also opened entities up to more security issues, such...

5 Next-Generation Healthcare Security Solutions

by Bill Kleyman

The modern healthcare data center has truly evolved. We’re now seeing the emergence of a truly interconnected healthcare technology ecosystem spanning numerous heterogeneous IT platforms. Throughout all of this, security continues...

Learning from the Banner Health Cybersecurity Attack

by Elizabeth Snell

Last week, Arizona-based Banner Health reported it had been the victim of a cybersecurity attack, potentially compromising 3.7 million records in the process.  The incident was discovered on July 7, but Banner stated that the attack...

IT Consumerization and its Impact on Healthcare Data Security

by Bill Kleyman

As you walk through today’s modern hospitals and healthcare environments you’ll notice a very obvious trend, and one that will affect healthcare data security. Healthcare organizations are revolutionizing patient and health...

Preparing Against Current Healthcare Cybersecurity Threats

by Elizabeth Snell

As more healthcare ransomware cases are reported, it becomes even more apparent that organizations of all sizes can no longer assume that they will never be a target of a healthcare cybersecurity attack. Covered entities must ensure that...

End-Point Devices Pose Challenges to Healthcare Cybersecurity

by Jacqueline LaPointe

With malware attacks, such as ransomware, becoming more common, healthcare organizations may need to reevaluate their healthcare cybersecurity framework when it comes to end-point devices, such as laptops, smartphones, tablets, and other...

How End-Point Evolution Will Impact Healthcare Data Security

by Bill Kleyman

In terms of trends, we need to come to some serious realities as it relates to the conversation around the Internet of Things (IoT) and healthcare data security. IoT and wearable systems will be making a big impact on a variety of...

FDA Releases Medical Device Cybersecurity Guidance

by Patrick Ouellette

The Food and Drugs Administration (FDA) released its much-anticipated “Management of Cybersecurity in Medical Devices” guidance to update manufacturers on medical device cybersecurity best practices. Given the explosion of...

FDA medical device and cybersecurity workshops well-timed

by Patrick Ouellette

With more attention being placed on mHealth and medical device security, the Food and Drug Administration (FDA) chose a good time to provide medical device and cybersecurity workshops. The FDA will hold its “Collaborative Approaches...

Legacy health app support, next-gen designs can boost security

by Bill Kleyman

As more healthcare organizations move towards a cloud computing and virtualization-enabled environment, applications continue to remain a big concern. Emerging trends clearly indicate that associates, doctors, nurses and other healthcare...

Conn. AG requests details on Apple Watch privacy practices

by Patrick Ouellette

Connecticut Attorney General George Jepsen is looking for answers regarding the new Apple Watch’s new privacy protections and how Apple plans on enforcing them. Because reports suggest that the Apple Watch will be able to collect,...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy


no, thanks

Continue to site...