Healthcare Information Security

User Authentication

New Phishing Tool Bypasses Two-Factor Authentication

January 9, 2019 - A security researcher recently released a hacking tool that takes phishing attacks to a whole new level: It both automates phishing attacks and breaks through two-factor authentication functions with ease. Modlishka was created by Piotr Duszynski is a reverse proxy, modified to handle traffic from login pages and phishing campaigns. It’s launched between the user and targeted...


More Articles

User Authentication Most Common Cyber Risk for Hospitals, Health Systems

by Jessica Davis

User authentication deficiencies, endpoint leakage, and excessive user permissions are the three most common cyber risks facing health systems and hospitals, according to new data from Clearwater CyberIntelligence Institute. The...

Applying Inogen Data Breach Lessons to Healthcare Providers

by Fred Donovan

The recent Inogen data breach, in which hackers were able to penetrate an employee’s email account, highlights the need for healthcare organizations to use multifactor authentication (MFA) to control access and to get...

OIG Compliance Audit Finds HHS Risk Management, IAM Issues Continue

by Elizabeth Snell

The enterprise-wide information security program within the Department of Health and Human Services (HHS) has improved, but there are still risk management weaknesses, issues with identity and access management (IAM), and problems in other...

58% of Healthcare PHI Data Breaches Caused by Insiders

by Elizabeth Snell

Reducing paper-based PHI and establishing a holistic risk management program are critical ways organizations can work toward healthcare PHI data breach prevention, according to Verizon research. Healthcare is the only industry where...

Symantec, VMware Named Best in KLAS for Data Security Solutions

by Elizabeth Snell

The Best in KLAS Awards were announced earlier this week, with Symantec, VMware, and Imprivata being named to the top slots of various data security solutions categories. KLAS took data from 2,500 interviews it conducts with providers and...

Crafting a Strong Healthcare Cybersecurity Action Plan

by Elizabeth Snell

Following recent research showing that 83 percent of physicians report they have experienced a cybersecurity attack, AHIMA released a healthcare cybersecurity action plan to assist entities in preparing for potential threats. Implementing...

PA Security Breach from Missing External Hard Drive Affects 4.1K

by Elizabeth Snell

Pennsylvania-based Washington Health System (WHS) Greene recently announced that a missing external hard drive has created security breach concerns at the organization. The device was for the Bone Densitometry machine and contained...

Reducing Insider Data Breach Risk with Strong IAM Policies

by Elizabeth Snell

Implementing effective identity and access management (IAM) policies and controls is essential for healthcare organizations that are looking to reduce the potential of insider data breach risk, according to the OCR November 2017...

Healthcare Identity, Access Management Center of Imprivata Deal

by Elizabeth Snell

Imprivata recently acquired the Identity and Access Management Business of Caradigm, according to a press release. The move should help healthcare identity and access management specifically, with a focus on reducing security risks and...

Improve Healthcare Authentication with New NIST Guide

by Elizabeth Snell

NIST recently released updated digital identity guidelines for federal agencies looking to create a secure authentication process. While not designed for healthcare authentication specifically, the guidelines could help the industry ensure...

FTC Blogs Review Data Security, Data Breach Prevention Basics

by Elizabeth Snell

The FTC has started a blog series to help organizations better understand the agency’s approach to data security, and to ensure that entities in numerous sectors can create strong data prevention measures. Starting with the...

OPM Data Breach Controls Improved, Further Action Required

by Elizabeth Snell

The Office of Personnel Management (OPM) has made improvements in its data security, but a Government Accountability Office (GAO) report still outlined several areas where OPM data breach controls can be strengthened. The 2015 OPM data...

Most Wired Org Focuses on Multi-Level Healthcare Data Security

by Elizabeth Snell

The American Hospital Association’s Hospital & Health Networks (H&HN) Most Wired rankings showed that more organizations are finding successful ways to balance innovation and healthcare data security. St. Luke’s...

Improve Healthcare Data Security with Stronger Authentication

by Elizabeth Snell

The comment period recently closed on NIST special publications discussing digital identity guidelines, which could potentially impact healthcare organizations working to improve their healthcare data security measures. “Identity...

Utilizing Healthcare Authentication for Stronger Data Security

by Elizabeth Snell

Finding the right balance between security and convenience is often tricky for healthcare providers, especially as technology continues to quickly evolve. Implementing stronger access controls and healthcare authentication options can help...

Using IAM Solutions for Stronger Cybersecurity Measures

by Elizabeth Snell

Identity access management (IAM) solutions are essential for organizations that are looking to improve their cyber hygiene approach and overall cybersecurity measures, according to a recent Institute for Critical Infrastructure Technology...

OCR Newsletter Underlines Healthcare Authentication Importance

by Elizabeth Snell

One of the causes of healthcare data breaches over the past few years has been to weakened healthcare authentication measures, according to the Office for Civil Rights (OCR). As healthcare continues to be a top target for cyber attacks,...

Will Privileged User Abuse Affect Healthcare Data Security?

by Elizabeth Snell

Employee access is a key aspect of healthcare data security, and healthcare organizations of all sizes need to ensure that their administrative safeguards account for the type of information employees view, use, or transfer. A recent...

Utilizing Administrative Safeguards to Prevent Insider Threats

by Elizabeth Snell

Preventing healthcare insider threats needs to be a top priority for covered entities of all sizes, and with cybersecurity threats evolving each day, training methods must also remain current. Administrative safeguards, including user...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy


no, thanks

Continue to site...