Healthcare Information Security

Cybersecurity News

Google Cloud Partners with Imprivata on Single Sign-On Access

February 15, 2019 - Imprivata, a health IT security firm, is partnering with Google Cloud to enable single sign-on capabilities on Chrome devices in the healthcare sector, the companies announced this week at HIMSS19. The collaboration will leverage Imprivata OneSign, a single sign-on and virtual desktop access healthcare platform, to eliminate the need for providers to repeatedly type in their usernames...


Blockchain Vendors Team with MDW on Medical Imaging Security


Radiology blockchain marketplace Medical Diagnostic Web is partnering with two blockchain vendors, Bitfury and Longenesis, to build a new platform designed to maintain, share, and secure medical imaging data, the companies announced at...

Phishing, Negligent Insiders Leave Healthcare Vulnerable, HIMSS says


The healthcare sector is continuing to make positive improvements around cybersecurity, with many allocating more budgets to shore up threats. However, legacy systems and failure to perform phishing tests “raise grave concerns”...

How Multi-Factor Authentication Can Combat Phishing, Cyberattacks


Healthcare has been steadily moving into consumerization, as the industry shifts into value-based care and patients demand easier access to their data. At the same time, cyber threats and hackers have increased in sophistication,...

HIMSS19 to Showcase Compliance, Device Security, Vendor Management


Cybersecurity, compliance, medical device security, and other pressing security matters will take center stage at the HIMSS19 annual conference, taking place February 11-15 in Orlando, Florida. Throughout the conference, visitors can...

The Hits and Misses of HHS Healthcare Cybersecurity Guidelines


The Department of Health and Human Services released a four-volume set of cybersecurity guidelines for the healthcare sector last month, which was applauded by many for its extensive breakdown of both risks and mitigations. Drafted in...

DHS Alerts to Vulnerabilities in Stryker and BD Medical Devices


The Department of Homeland Security National Cybersecurity and Communications Integration Center released two advisories on Tuesday, notifying the healthcare sector of vulnerabilities in Stryker medical beds and Becton, Dickinson (BD)...

LabKey Server Flaws Put Medical Research Data at Risk


Tenable Research discovered three vulnerabilities in the LabKey Server, an open source medical data collaboration tool, which potentially could put medical research data at risk of unauthorized access. Released on Thursday, the report...

Credential Compromise Top Goal of Phishing Attacks in 2018


Phishing attacks exploded in 2018, with hackers leveraging the attacks in hopes to score the credentials from their victims, according to a new report from Proofpoint researchers. Compromising credentials as the goal of phishing attacks...

Improving Medical Device Security Beyond Patching, Traditional Tools


Medical device security was thrust into the spotlight in 2018, as the Food and Drug Administration continued to bolster its cybersecurity program. In fact, an August MedCrypt report found that since the FDA released its cybersecurity...

Trojan Malware Tops Ransomware as Biggest Hacking Threat to Healthcare


Trojan malware upended ransomware as the greatest hacking threat to the healthcare sector in 2018, according to a new report from Malwarebytes Labs. Specifically, Emotet and Trickbot hacking trojans were the most common malware strains,...

Feds Issue Emergency Directive on DNS Infrastructure Hijacking Attacks


The Department of Homeland Security Cybersecurity and Infrastructure Security Agency issued a rare emergency directive to all federal agencies to secure its DNS infrastructure, in the wake of a mass DNS infrastructure hijacking...

Healthcare Cyberattacks Cost $1.4 Million on Average in Recovery


The average healthcare organization spent $1.4 million to recover from a cyberattack, according to a recent report from Radware. The number is slightly lower than other industries, which spent $1.67 million. The Radware 2018-2019 Global...

Cryptomining Top Malware Threat, Multi-Purpose Malware Surges


For the past 13 months, cryptomining topped the list of leading malware threats, according to Check Point’s latest Global Threat Index for December 2018. In fact, the top four malware threats were cryptomining variants, despite the...

Notorious Ryuk Ransomware Adds Trojans to Cyberattack Method


Ryuk ransomware – which pummeled the healthcare sector in the fall – has added Emotet and Trickbot trojans to its attack method, to gain access into a network, according to new research from FireEye and CrowdStrike. The...

Judge Gives Boston Children’s Hospital Hacker 10-Year Jail Sentence


The hacker behind the notorious 2014 cyberattack on Boston Children’s hospital and another facility has been sentenced to 10 years in prison. In August 2018, Martin Gottesfeld was found guilty of launching the attack on behalf of...

Hackers Launching DNS Infrastructure Hijacking Campaign, Feds Warn


Hackers are targeting Domain Name System (DNS) infrastructure with a global hijacking campaign across all sectors, according to a new alert from the Department of Homeland Security National Cybersecurity and Communications Integration...

Massive SingHealth Data Breach Caused by Lack of Basic Security


Singapore’s July 2018 personal data breach of 1.5 million SingHealth patients, including Prime Minister Lee Hsien Loong, was caused by bad system management, a lack of employee training, and other major flaws, according to the...

New Phishing Tool Bypasses Two-Factor Authentication


A security researcher recently released a hacking tool that takes phishing attacks to a whole new level: It both automates phishing attacks and breaks through two-factor authentication functions with ease. Modlishka was created by Piotr...

Protenus, RADAR Partner to Mitigate Healthcare Cybersecurity Risks


Protenus, a health compliance analytics platform announced it’s partnering with RADAR, an incident response management software vendor on a new tool that leverages automation, predictive analytics, and artificial intelligence to...


SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
Data Breaches

Our privacy policy

no, thanks

Continue to site...