Healthcare Information Security

Cybersecurity News

US-CERT Urges Updates to Counter Found WiFi Vulnerabilities

by

WiFi Protected Access II (WPA2) handshake traffic could potentially be manipulated by attackers within range of vulnerable devices, according to recent research. The WiFi vulnerabilities could lead to malicious users gaining access to passwords,...

Regular Employee Training Essential in Healthcare Cybersecurity

by

Healthcare cybersecurity threats are constantly evolving, forcing covered entities and business associates to subsequently adjust their privacy and security measures to keep PHI secure. A key aspect to data security though is regular employee...

HIMSS Calls for Secure Data Exchange, HHS Cybersecurity Role

by

In two separate publications, HIMSS has stressed the need for nationwide secure data exchange and also maintained that healthcare must have “a champion at HHS encouraging stakeholders to be proactive and relentlessly vigilant about cybersecurity.”...

Partnership Stressed in IoMT Medical Device Cybersecurity Bill

by

Two state representatives introduced a medical device cybersecurity bill this week that focuses on centralizing current and relevant frameworks, guidelines, and standards for Internet of Medical Things (IoMT) devices. There must be collaboration...

Health IT Security, FHIR Focus of ONC Secure API Server Challenge

by

ONC is challenging healthcare stakeholders to build secure Fast Healthcare Interoperability Resources (FHIR) servers to improve health IT security and ensure that secure FHIR options are available in the future. The Secure API Server Showdown...

Education, Information Sharing Key in Healthcare Cybersecurity

by

Creating a strong culture of healthcare cybersecurity, including employee education, risk assessments, and information sharing are all essential aspects for healthcare organizations currently, according to industry stakeholders. Cook Children’s...

Medical Device Cybersecurity Focus of AEHIS, MDISS Collaboration

by

Medical device cybersecurity education, best practices, advocacy, and information sharing are key objectives in the recently announced collaboration between the Association for Executives in Healthcare Information Security (AEHIS) and the Medical...

3 Ways All-Flash Could Benefit Your Healthcare Data Security

by

Working with healthcare data security over the past couple of years has been really interesting. First of all, we’re seeing a bit of a redesign happening around efficiency, user optimization, and improved systems that are capable of delivering...

Creating a Culture of Data Privacy, Security in Healthcare

by

Organizations of all sizes need to be working toward maintaining proper data privacy and security measures in the healthcare industry. The threat landscape is continuously evolving, and falling behind could lead to a large-scale data breach....

NIST CSF, Risk Management Key for Cybersecurity Improvements

by

The NIST Cyberscurity Framework (CSF) can be implemented using the established NIST risk management process, which will help organizations across industries develop a more effective, efficient, and cost-effective risk management processes, according...

Alabama Medicaid Data Security, Information Security Can Improve

by

Alabama's Medicaid Management Information System (MMIS) had an adopted security program, but there were still potential vulnerabilities stemming from lacking Medicaid data security, according to a recent OIG investigation. “These...

How Vendors, Providers Can Create Strong Health Data Security

by

When it comes to maintaining HIPAA compliance, both healthcare providers and their chosen third-party vendors – or business associates – need to work together for comprehensive and current health data security. Compliance can get...

Focusing on Healthcare IoT Security with Expanding Market

by

The Internet of Things (IoT) is quickly becoming a more attractive option to organizations across sectors, but IoT security, standards, interoperability, and cost are still key concerns for executives, a recent report found. Verizon’s State...

EHRA: Health Data Sharing Not Aided with Regulatory Penalties

by

Advocating for penalizations for providers and EHR developers is the wrong approach for encouraging health data sharing, according to a recent EHR Association (EHRA) blog post. Written in response to a Health Affairs post by former ONC Chief...

HITRUST Urges Collaboration for Improved Healthcare Cybersecurity

by

HITRUST held its first Community Extension Program meeting last week at Tufts Medical Center in downtown Boston, talking challenges, best practices, and lessons learned in healthcare risk management programs. One of the overarching goals of the...

Using Threat Intelligence to Improve Healthcare Cybersecurity

by

While 84 percent of organizations consider threat intelligence “essential to a strong security posture,” entities admit that the large amount of threat data and a lack of staff expertise lower their threat program effectiveness, according...

Why Guidance is Critical for Strengthening Healthcare Cybersecurity

by

Healthcare providers must adhere to HIPAA rules and required state regulation with regard to maintaining data security. But not all regulations are specific in how covered entities should approach healthcare cybersecurity in an evolving industry....

ICS-CERT Reports Medfusion Medical Device Vulnerabilities

by

Recently discovered medical device vulnerabilities in infusion pumps could potentially allow a remote attacker to gain unauthorized access, affecting the pump’s intended operation, according to the Department of Homeland Security’s...

Medical Device Security Critical with FDA Interoperability Guide

by

Safely and effectively exchanging and using data is the key focus of the recent FDA guide on medical device security and interoperability. FDA explained that Design Considerations and Pre-market Submission Recommendations for Interoperable Medical...

3 Tips to Ensure Healthcare Data Security in Evolving Environment

by

There’s so much happening with new types of advanced security technologies. Healthcare data security teams must analyze solutions around on premise as well as cloud options. Furthermore, the granularity of security makes it a challenge...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks