Healthcare Information Security

Cybersecurity News

Building a Secure Vendor Relationship with Inventory, Management

by

The healthcare sector has been a primary target of hackers for more than a year, and the attacks continue to increase in sophistication. While many providers have adjusted their security posture in attempt to shore up some of these...

Hospital Leaders Feel Underprepared for Cybersecurity Threats

by

About 75 percent of providers and 62 percent of administrators feel underprepared to face cybersecurity risks, due to staffing, training, and awareness, according to a new report from medical device manufacturer Abbott and the Chertoff...

Homeland Security Gains Cybersecurity Agency with New Legislation

by

The House of Representatives unanimously passed legislation on Monday, establishing the Cybersecurity and Infrastructure Security Agency with the Department of Homeland Security. The Senate passed the bill in October, and it now heads to...

VUMC Fights Healthcare Phishing with Multi-Factor Authentication

by

The healthcare sector has remained a primary target for phishing attacks in recent years, with highly targeted viruses like SamSam and Ryuk wreaking havoc on the industry. In fact, one in every hundred emails sent globally has malicious...

SSNs, Tax Data Exposed in Healthcare.gov Health Data Breach

by

Partial Social Security numbers (SSNs), immigration status, and tax information might have been stolen as a result of the health data breach on the Healthcare.gov portal last month. In October, CMS admitted to a breach of...

HITRUST’s New Threat Catalogue Key Component of Risk Analysis

by

The Health Information Trust Alliance (HITRUST) has released its threat catalogue that provides healthcare organizations and other firms with visibility into cyber risks to their information, assets, and operations. The HITRUST threat...

Cybersecurity Vulnerabilities Flagged in Roche Handheld Devices

by

ICS-CERT is warning about cybersecurity vulnerabilities in Roche point-of-care handheld medical devices. The devices, which go by the names Accu-Chek and CoaguChek, suffer from improper authentication, OS command injection, unrestricted...

NJ Fines Vendor Behind Virtua Healthcare Data Breach $200K

by

New Jersey is slapping a $200,000 fine on a defunct Georgia-based medical transcription company that caused the Virtua Medical Group breach impacting more than 1,650 individuals in 2016. The $200,000 fine includes $191,492.00 in civil...

4.4M Records Exposed in 117 Health Data Breaches in Q3 2018

by

A total of 4.4 million patient records were compromised in 117 health data breaches in the third quarter of 2018, according to the latest Protenus Breach Barometer. These figures compare with 3.15 million records compromised in 142 health...

Many IT Pros Lack Budget for Connected Medical Device Security

by

A disturbing 41 percent of healthcare IT professionals do not have a separate or sufficient budget for connected medical device security, according to a recent survey by Propeller Insights on behalf of Zingbox. Despite this lack of...

Healthcare Makes Up One-Quarter of SamSam Ransomware Attacks

by

Healthcare organizations have accounted for one-quarter of SamSam ransomware attack victims so far this year, said security firm Symantec in a recent blog post.  In total, 67 different organizations across sectors have been...

FDA Needs Procedures for Recalls of Vulnerable Medical Devices

by

HHS OIG is recommending that the FDA establish and maintain procedures for handling recalls of vulnerable medical devices that can be exploited by attackers or other unauthorized users. In addition, OIG advises the FDA to establish...

OCR Recommends Healthcare Cybersecurity Best Practices

by

As National Cybersecurity Awareness Month draws to a close, OCR is recommending healthcare cybersecurity best practices to prevent cyberattacks from succeeding and lessening their impact if they do succeed. “Because ePHI...

Only 29% of Healthcare Entities Have Full Cybersecurity Program

by

Only 29 percent of healthcare organizations report having a comprehensive cybersecurity program in place, according to the 2018 CHIME HealthCare’s Most Wired survey released this week. Among those organizations that don’t have...

Cybersecurity Vulnerabilities Lurk in Brain Stimulation Devices

by

Neurostimulators have cybersecurity vulnerabilities that could be exploited by hackers to get access to the devices, manipulate them, and steal data transmitted by them. This was the conclusion of a report prepared by security firm...

Healthcare Continues To Bear the Brunt of Ransomware Attacks

by

Healthcare remains the most targeted industry by ransomware attacks, which have spiked in the third quarter of 2018, according to latest data from specialist insurer Beazley. Ransom demands in the most sophisticated type of breaches also...

HHS Opens Healthcare Cybersecurity Center To Aid Private Sector

by

HHS has opened its Health Sector Cybersecurity Coordination Center (HC3), which will be a healthcare cybersecurity threat analysis and incident response partner to the private sector. HC3 replaces the Healthcare Cybersecurity and...

Server Configuration Is Top Healthcare Software Vulnerability

by

Server configuration is the top healthcare software vulnerability, followed by information leakage and cryptographic issues, according to Veracode’s State of Software Security (SOSS) study. Other top vulnerabilities for...

HHS OIG Probes Healthcare.gov Portal Data Breach Affecting 75K

by

HHS OIG is investigating the Healthcare.gov portal data breach that put personal information on 75,000 individuals at risk. So far, the office has determined that no PHI, banking, or tax information was exposed during the breach,...

HSCC Wants Healthcare Cybersecurity Waiver to Anti-kickback Rules

by

The Healthcare Sector Coordinating Council (HSCC) asked the HHS OIG for a waiver to the anti-kickback rules to enable the donation of healthcare cybersecurity technology and services to improve the cybersecurity of smaller healthcare...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy


no, thanks

Continue to site...