Healthcare Information Security

Health Network Security

Man Convicted of DDoS Attack Against Boston Children’s Hospital

August 6, 2018 - Martin Gottesfeld of Somerville, Massachusetts, was convicted by a federal jury of carrying out a DDoS attack against Boston Children’s Hospital and against Wayside Youth and Family Support Network, the Department of Justice (DoJ) announced August 1. Gottesfeld, who identified himself as a member of Anonymous, said he was protesting the treatment of a teenager in a...


More Articles

Securing IoT Devices in the Increasingly Connected Hospital System

by Bill Kleyman

As a millennial, I love working with a connected hospital system. I can chat with my doctors through my phone, I can track my own information when I’m doing a visit, and I can even show my doctor some health stats from my fitness...

Achieving Healthcare Compliance, Security in Provider Settings

by Elizabeth Snell

Providers need to maintain healthcare compliance and ensure their data security measures are strong enough to combat ever-evolving threats. However, compliance and security are not interchangeable and entities must focus on both for...

US Reports North Korea Caused WannaCry Ransomware Attack

by Elizabeth Snell

The WannaCry ransomware attack that affected numerous sectors around the world, including healthcare organizations, was caused by North Korea, according to Tom Bossert, assistant to the president for homeland security and...

OIG: NC Medicaid Eligibility Data Security Measures Must Improve

by Elizabeth Snell

The North Carolina State Medicaid agency (State agency) failed to meet federal requirements for Medicaid eligibility data security, according to an Office of Inspector General (OIG) report. The State agency had the Office of North...

Potential BD Medical Device Security Vulnerability Identified

by Elizabeth Snell

Researchers identified a potential medical device security vulnerability in Becton, Dickinson and Company’s (BD) Alaris 8015 Point of Care (PC) unit Version 9.5, according to the Department of Homeland Security’s Industrial...

Why Open Source Security Matters for Healthcare Orgs

by Elizabeth Snell

Open source software can help healthcare organizations remain flexible as they adopt new IT solutions, but if entities lack open source security measures it can lead to larger cybersecurity issues. A recent survey found that organizations...

US-CERT Urges Updates to Counter Found WiFi Vulnerabilities

by Elizabeth Snell

WiFi Protected Access II (WPA2) handshake traffic could potentially be manipulated by attackers within range of vulnerable devices, according to recent research. The WiFi vulnerabilities could lead to malicious users gaining access to...

Best Practices for SQL Server Deployment in Healthcare

by Bill Kleyman

I don’t want to spend too much time on a lengthy introduction; the topic around SQL server deployment and healthcare security is very important to cover. However, consider the fact that 2015 and 2016 were pretty awful years when it...

Why Healthcare Network Security is a Critical Provider Tool

by Elizabeth Snell

Covered entities are quickly implementing more technology into daily operations, which could potentially open the door for cyber criminals or even unauthorized insider access. Healthcare network security measures must be current and...

NIST Vulnerable Software Guide May Affect Health Data Security

by Elizabeth Snell

A collection of strategies for reducing software vulnerabilities could potentially affect healthcare organizations that are looking to improve their health data security measures. National Institute of Standards and Technology (NIST)...

3 Tips for Creating Healthcare Security Change, Process Controls

by Bill Kleyman

Healthcare and security are probably some of the hottest topics today. We’re seeing medial IoT emerging, more digitizing of the healthcare ecosystem, and more healthcare services specifically using technology to revolutionize patient...

Homeland Security Issues Ransomware Alert for Networked Systems

by Elizabeth Snell

The US Department of Homeland Security issued a ransomware alert through the US Computer Emergency Readiness Team (US-CERT) to organizations that use networked systems, warning them of the potential dangers stemming from this type of...

How to Successfully Integrate Secure Texting, Messaging

by Elizabeth Snell

Healthcare secure texting and secure messaging options are quickly increasing in popularity for covered entities. Providers are not only looking for secure, convenient ways to communicate internally, but externally as well. More patients...

Why Medical Device Security is a Key 2016 Healthcare Issue

by Elizabeth Snell

Medical device security has quickly evolved into a top area of concern for covered entities. With more healthcare organizations connecting to HIEs, implementing BYOD strategies, and simply adopting more connected devices than before, it...

What Does 2016 Hold for Healthcare Data Security, Storage?

by Bill Kleyman

Welcome to 2016! I’m sure all of you got some cool new gadgets or toys in your stockings. Maybe it was a new iPhone. Or, maybe you got a new Pebble Watch. Or - you just bought a new google-ready 70-inch LED TV. One thing pretty...

Utah Dept. of Health Medicaid Data Security Risks Found

by Elizabeth Snell

The Utah Department of Health (DOH) was found to have certain Medicaid data security risks, according to a recent Office of Inspector General (OIG) report. Along with weaknesses found in a comprehensive information system general controls...

Charles Stellar Named WEDI Interim President, CEO

by Elizabeth Snell

The Workgroup for Electronic Data Interchange (WEDI) announced earlier this week that Charles W. Stellar was named as the organization’s interim president and CEO. Devin Jopp, Ed.D. resigned earlier this month, but WEDI explained...

Securing Healthcare Networks from Advancing Cyber Threats

by Bill Kleyman

The security threat matrix for the healthcare IT environment is evolving. Why? There are more users, a lot more data and new technologies that are capable of carrying information over vast, widely-distributed ecosystems. In fact, a recent...

3 Tips for Managing the Healthcare Security Threat Landscape

by Bill Kleyman

The healthcare IT, data center, and cloud landscape is changing. In fact, it’s already changed. Adversaries are no longer lone wolves, but have become a community that is trying new techniques, trades intellectual property, and...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks