Healthcare Information Security

Cybersecurity News

Ransomware Attack Worries Healthcare IT Pros the Most

by

A ransomware attack is the type of cyberattack that most worries healthcare IT professionals, according to a survey of 102 HIMSS18 attendees by security firm Imperva. Almost 10 percent of those surveyed had paid a ransom or extortion fee,...

Best Practices to Secure Healthcare IoT, Connected Devices

by

We live in a connected world. This spans the data center, healthcare IoT, and the enterprise data center. In fact, many of you reading this right now may well have a Nest or Philips Hue in your house. Some of you, like me, might have even...

Older Healthcare OSes Open to Cybersecurity Vulnerabilities

by

The healthcare industry is the slowest industry in upgrading to Windows 10, meaning that many in healthcare are running older versions of Windows more susceptible to cybersecurity vulnerabilities, according to the latest data from Duo...

Data on 500K Patients Exposed in LifeBridge Healthcare Data Breach

by

LifeBridge Health, a healthcare provider located in northwest Baltimore, has notified more than 500,000 patients that their personal information may have been exposed in a September 2016 healthcare data breach, the provider said in a...

Healthcare Ransomware Attacks Soared in Q3 2017

by

The number of healthcare ransomware attacks exploded in the third quarter of 2017, far outpacing all other types of cyberattacks against healthcare companies, but then dropped off sharply in the fourth quarter, according to the latest data...

HITRUST Unveils Certification for NIST Cybersecurity Framework

by

The Health Information Trust Alliance (HITRUST) launched May 22 a certification program for the NIST Cybersecurity Framework (CSF) that makes it easier for security teams to report on their implementation of the framework to upper...

Most Healthcare Workers Admit to Non-Secure Healthcare Data Sharing

by

Most healthcare workers surveyed admit to non-secure healthcare data sharing using email. A disturbing 87 percent of healthcare workers admit to using non-secure email to send sensitive information, including PHI, according to survey data...

Healthcare Least Prepared for Ransomware Attacks, Other Cyberattacks

by

The healthcare and public health sector is the least prepared of the critical infrastructure industries for ransomware attacks and other types of cyberattacks, according to a recent Pwnie Express survey of 582 IT security professionals...

Healthcare Data Encryption Used by Half of US Organizations

by

Around 50 percent of US healthcare IT pros said their organizations are investing in healthcare data encryption to protect sensitive data, according to a recent survey by network management and security company Infoblox. Encryption of PHI...

Cyberattackers Exploiting Weaknesses in Healthcare Data Security

by

Cyberattackers are exploiting inherent weaknesses in healthcare data security, making the sector the most targeted industry in the first quarter of 2018, according to Rapid7’s quarterly threat report released May 15. The Rapid7...

Healthcare Data Security Programs Get Short Shrift in IT Budgets

by

Healthcare data security programs continue to be underfunded and understaffed, a Black Book Market Research cybersecurity survey of close to 2,500 healthcare security professionals found. Almost all of the respondents agreed that...

ICS-CERT Dings Silex, GE for Wireless Cybersecurity Vulnerabilities

by

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) issued an advisory May 8 warning about cybersecurity vulnerabilities in wireless medical equipment made by Silex Technology and GE Healthcare. The...

Healthcare Providers Score High on Ransomware Attack Mitigation

by

Researchers have found that healthcare providers are doing a good job of implementing recommendations in the ONC SAFER Guides’ contingency planning guide, which was updated last year to incorporate strategies for ransomware attack...

Healthcare Data Security Key Part of NIH All of Us Program

by

Healthcare data security is a key component of the National Institutes of Health (NIH)-sponsored All of Us precision medicine research program, said Program Director Eric Dishman in opening the national enrollment for the...

Philips CT Scanner Cybersecurity Vulnerabilities Pose PHI Risk

by

Cybersecurity vulnerabilities in Philips Brilliance CT scanners could be exploited by an attacker to steal protected health information (PHI) and other sensitive data files, warned the Industrial Control Systems Cyber Emergency Response...

UnityPoint Allegedly Mishandled Healthcare Data Breach

by

UnityPoint Health delayed reporting a healthcare data breach, incorrectly told affected patients that their Social Security numbers were not part of the breach, and declined to compensate victims for damage to their credit from the breach,...

1.13M Records Exposed by 110 Healthcare Data Breaches in Q1 2018

by

Around 1.13 million patient records were compromised in 110 healthcare data breaches in the first quarter of 2018, according to data released May 3 in the Protenus Breach Barometer. Healthcare insiders were most likely to snoop on family...

5 Critical Healthcare Data Security Implementations for Providers

by

I get the chance to work with smaller clinics and very large healthcare providers. If you hide the name and the size of the organization, many of them share very similar security concerns. The good news is that innovation in the healthcare...

Healthcare Industry Takes Brunt of Ransomware Attacks

by

The healthcare industry is taking the lion’s share of ransomware attacks, according to a threat report released May 1 by endpoint security firm Cylance. Ransomware attacks grew three-fold last year, with healthcare being affected...

Helping Struggling Hospitals Recover from Ransomware Attacks

by

The biggest cybersecurity issue for hospitals is response and recovery from ransomware attacks, observed Fernando Martinez, senior vice president and chief digital officer at the Texas Hospital Association and president/CEO of Texas...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy


no, thanks

Continue to site...