Healthcare Information Security

Infrastructure Security

Congress Unveils Bipartisan Bill for IoT Cybersecurity Standards

March 14, 2019 - A group of bipartisan Senators and House members recently introduced legislation that would establish security requirements around IoT devices purchased by government agencies, such as the Department of Health and Human Services. Introduced by Sens. Mark Warner (D-VA), Cory Gardner (R-CO), Maggie Hassan (D-NH), and Steve Daines (R-MT), alongside Reps. Robin Kelly (D-IL) and Will Hurd...

More Articles

OIG Finds Vulnerabilities in HHS Security Controls, Detection

by Jessica Davis

The Department of Health and Human Services’ Operating Divisions (OPDIVs) needs to improve its security controls to more effectively detect and prevent cyberattacks, according to a new Office of Inspector General report. Officials...

25% of Healthcare Providers Faced Mobile Device Breach in 2018

by Jessica Davis

Twenty-five percent of healthcare organizations suffered a mobile-related breach in the last year, with 67 percent of those organizations reporting the compromise as “major,” according to the latest Verizon Mobile Security...

Congress Proposes Bill Funding Cybersecurity Education Program

by Jessica Davis

Reps. Jim Langevin, (D-RI) and Glenn Thompson, (R-PA) reintroduced legislation that would jumpstart the development of Career and Technical Education and incorporate cybersecurity training skills into curricula. The proposed bill would...

Security to Shift from Prevention to Threat Detection, Gartner says

by Jessica Davis

Security teams are beginning to shift away from a staunch prevention focus into threat detection and response, as hackers and cyber threats continue to increase in sophistication, according to Gartner. Gartner identified seven risk...

Microsoft Shares Security Guidance, as Supply-Chain Attacks Surge

by Jessica Davis

Microsoft recently released its annual security report, which highlighted the increase in cryptomining and supply-chain attacks in 2018. The findings upheld those from other security researchers from earlier this year: Ransomware attacks...

Laptops Pose Serious Data Security Risk to Hospitals, Health Systems

by Jessica Davis

Hospitals and health systems are continuing to struggle with laptop vulnerabilities, caused primarily by endpoint data loss, excessive user permissions, and dormant accounts, according to new findings from Clearwater CyberIntelligence...

What’s at Stake with Healthcare IoT and Cloud? Unnecessary Risk

by Jessica Davis

The healthcare sector continues to adopt IoT technologies and move into the cloud at a rapid pace. But while these technologies support a value-based care model and can improve patient care, the tools can pose serious risks that...

LabKey Server Flaws Put Medical Research Data at Risk

by Jessica Davis

Tenable Research discovered three vulnerabilities in the LabKey Server, an open source medical data collaboration tool, which potentially could put medical research data at risk of unauthorized access. Released on Thursday, the report...

Feds Issue Emergency Directive on DNS Infrastructure Hijacking Attacks

by Jessica Davis

The Department of Homeland Security Cybersecurity and Infrastructure Security Agency issued a rare emergency directive to all federal agencies to secure its DNS infrastructure, in the wake of a mass DNS infrastructure hijacking...

Hackers Launching DNS Infrastructure Hijacking Campaign, Feds Warn

by Jessica Davis

Hackers are targeting Domain Name System (DNS) infrastructure with a global hijacking campaign across all sectors, according to a new alert from the Department of Homeland Security National Cybersecurity and Communications Integration...

Homeland Security Gains Cybersecurity Agency with New Legislation

by Jessica Davis

The House of Representatives unanimously passed legislation on Monday, establishing the Cybersecurity and Infrastructure Security Agency with the Department of Homeland Security. The Senate passed the bill in October, and it now heads to...

Threat Intelligence Sharing Essential for Healthcare Cybersecurity

by Elizabeth Snell

The National Health Information Sharing and Analysis Center (NH-ISAC) constantly stresses the need for threat intelligence sharing in the healthcare sector, especially as cybersecurity threats grow increasingly...

Federal Cybersecurity Program Funding Urged in Letter to Congress

by Elizabeth Snell

The Department of Homeland Security’s (DHS) federal cybersecurity program will greatly benefit from increased funding in Fiscal Year 2019, according to a trio of lawmakers. Reps. John Ratcliffe (R-Texas), Jim Langevin (D-R.I.) and...

NH-ISAC, Anomali Partner to Improve Secure Healthcare Data Sharing

by Elizabeth Snell

Having a more seamless secure healthcare data sharing process is at the driving factor behind the National Health Information Sharing and Analysis Center (NH-ISAC) and Anomali recently partnering together. The organizations want...

Stronger Healthcare Cyber Hygiene Can Improve Patient Safety

by Elizabeth Snell

HHS’ Office of Inspector General (OIG) should create an exemption allowing donations of training/education services, software, and technology to improve healthcare cyber hygiene, according to the Association for Executives in...

Avoiding 5 Common Healthcare Data Security Holes in 2018

by Bill Kleyman

Healthcare data security is an ever-evolving engine, oftentimes struggling to keep up with the demands of the digital world. However, as fast as healthcare IT keeps moving forward, security must absolutely be at the forefront. Breaches...

HIMSS: NIST CSF Can Improve Healthcare Cybersecurity Infrastructure

by Elizabeth Snell

NIST’s second draft of its Cybersecurity Framework (the Framework) is overall a positive step toward improving the nation’s cybersecurity, according to comments from HIMSS. However, there is room for some improvement to ensure...

How Compliance, Data Security Needs Shift with Big Data Push

by Elizabeth Snell

Numerous companies are working to evolve their database ecosystems through cloud and big data initiatives, and are subsequently facing an increasing number of compliance and data security needs. Recent research found though that not many...

How Automation Aids Data Security, Improves Patient Satisfaction

by Bill Kleyman

Want to know a common trend I’ve seen in pretty much every single healthcare customer I’ve worked with? Data. And I mean a lot of data. Healthcare organizations are producing vast amounts of data from a variety of points....


SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
Data Breaches

Our privacy policy

no, thanks

Continue to site...