Healthcare Information Security

Network Security

HealthEquity Email Hack Breaches Data of 190K Patients

November 20, 2018 - An email hack on two employee email accounts potentially breached the personal data of 190,000 HealthEquity customers. HealthEquity provides health savings accounts and similar services to more than 3.4 million individuals. This is the second breach reported by HealthEquity this year. In June, an unauthorized user hacked into an employee’s email account and breached the data of...


More Articles

Healthcare IT Security Worst of Any Sector With External Threats

by Fred Donovan

Healthcare IT security is the worst of any sector when it comes to external security posture, according to a recent report by security advisory firm Coalfire. The Coalfire Penetration Risk Report used customer penetration test data...

Man Convicted of DDoS Attack Against Boston Children’s Hospital

by Fred Donovan

Martin Gottesfeld of Somerville, Massachusetts, was convicted by a federal jury of carrying out a DDoS attack against Boston Children’s Hospital and against Wayside Youth and Family Support Network, the Department of...

19K Orlando Orthopaedic Patients At Risk from Lax Vendor Security

by Fred Donovan

Florida-based Orlando Orthopaedic Center reported to OCR on July 20 that 19,101 individuals were affected by lax vendor security, leading to a possible PHI breach. The breach occurred at a transcription service vendor in December,...

LabCorp’s Network Security Breach May Have Exposed PHI of Millions

by Fred Donovan

After recently dodging a legal bullet over an alleged HIPAA violation, LabCorp is now facing a network security breach that forced the North Carolina-based laboratory diagnostics firm to shut down its IT network, possibly placing PHI of...

Federal Cybersecurity Program Funding Urged in Letter to Congress

by Elizabeth Snell

The Department of Homeland Security’s (DHS) federal cybersecurity program will greatly benefit from increased funding in Fiscal Year 2019, according to a trio of lawmakers. Reps. John Ratcliffe (R-Texas), Jim Langevin (D-R.I.) and...

OIG Compliance Audit Finds HHS Risk Management, IAM Issues Continue

by Elizabeth Snell

The enterprise-wide information security program within the Department of Health and Human Services (HHS) has improved, but there are still risk management weaknesses, issues with identity and access management (IAM), and problems in other...

Achieving Healthcare Compliance, Security in Provider Settings

by Elizabeth Snell

Providers need to maintain healthcare compliance and ensure their data security measures are strong enough to combat ever-evolving threats. However, compliance and security are not interchangeable and entities must focus on both for...

VA Facility Lacking Security Risk Assessment, Security Controls

by Elizabeth Snell

The Veterans Services Adaptable Network (VSAN) at the Orlando Veterans Affairs Medical Center (VAMC) was not fully coordinated with the Office of Information and Technology (OI&T), which included not having a security risk assessment,...

Potential BD Medical Device Security Vulnerability Identified

by Elizabeth Snell

Researchers identified a potential medical device security vulnerability in Becton, Dickinson and Company’s (BD) Alaris 8015 Point of Care (PC) unit Version 9.5, according to the Department of Homeland Security’s Industrial...

US-CERT Urges Updates to Counter Found WiFi Vulnerabilities

by Elizabeth Snell

WiFi Protected Access II (WPA2) handshake traffic could potentially be manipulated by attackers within range of vulnerable devices, according to recent research. The WiFi vulnerabilities could lead to malicious users gaining access to...

Using SD-WAN in Telemedicine Capabilities, Network Security

by Bill Kleyman

There a lot of great conversations going on with a clear focus on technology and new ways to deliver amazing healthcare services and provide strong network security.  During the recent Value-Based Care Summit in Chicago, I got the...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy


no, thanks

Continue to site...