Healthcare Information Security
  • What’s at Stake with Healthcare IoT and Cloud? Unnecessary Risk

    February 14, 2019 - The healthcare sector continues to adopt IoT technologies and move into the cloud at a rapid pace. But while these technologies support a value-based care model and can improve patient care, the tools can pose serious risks that organizations must address before introducing them to their network. According to a recent report from Zion Market Research, the smart medical products global...

  • How Multi-Factor Authentication Can Combat Phishing, Cyberattacks

    February 7, 2019 - Healthcare has been steadily moving into consumerization, as the industry shifts into value-based care and patients demand easier access to their data. At the same time, cyber threats and hackers have increased in sophistication, continuing to target the sector to gain access to the troves of data. Many health delivery organizations still struggle with some of the basic cybersecurity...

  • HIMSS19 to Showcase Compliance, Device Security, Vendor Management

    February 1, 2019 - Cybersecurity, compliance, medical device security, and other pressing security matters will take center stage at the HIMSS19 annual conference, taking place February 11-15 in Orlando, Florida. Throughout the conference, visitors can visit the HIMSS19 Cybersecurity Command Center at the Orange County Convention Center. Hosting security vendors like Cisco, Clearwater, FairWarning,...

  • The Hits and Misses of HHS Healthcare Cybersecurity Guidelines

    January 30, 2019 - The Department of Health and Human Services released a four-volume set of cybersecurity guidelines for the healthcare sector last month, which was applauded by many for its extensive breakdown of both risks and mitigations. Drafted in partnership with over 150 cybersecurity healthcare and cybersecurity leaders, the guide effectively breaks down cybersecurity needs by organization size...


Today's Top Stories

Government Report Finds China Could Use Medical Data for Blackmail

China has been rapidly increasing its investment in the US biotechnology sector in recent years, which has potentially given them access to genetic, private, and medical data that could pose a security risk, according to a new report from...

42,000 AdventHealth Patients Impacted in Yearlong Data Breach

About 42,000 AdventHealth Medical Group Pulmonary and Sleep Medicine patients are being notified that their personal and health data was breached for more than a year due to a hack of the Florida provider’s systems. On December...

Google Cloud Partners with Imprivata on Single Sign-On Access

Imprivata, a health IT security firm, is partnering with Google Cloud to enable single sign-on capabilities on Chrome devices in the healthcare sector, the companies announced this week at HIMSS19. The collaboration will leverage...

What’s at Stake with Healthcare IoT and Cloud? Unnecessary Risk

The healthcare sector continues to adopt IoT technologies and move into the cloud at a rapid pace. But while these technologies support a value-based care model and can improve patient care, the tools can pose serious risks that...

United Hospital District Reports June 2018 Breach from Phishing Attack

Minnesota-based United Hospital District is notifying 2,143 patients that their data was compromised during a June 2018 phishing attack. According to officials, the breach occurred for about two weeks from June 10 and June 27, 2018. The...

OIG Finds Security Risks in NIH Data Sharing Processes, Controls

The Department of Health and Human Services’ Office of the Inspector General discovered risks in the ways the National Institutes of Health shares its sensitive data, including the controls of permitted access to sensitive NIH...

HIPAA Needs Clarity Around Patient Data Sharing, AMIA, AHIMA say

In recommendations to the Department of Health and Human Services, the American Health Information Management Association and American Medical Informatics Association are recommending updates to HIPAA that would both clarify right to...

View all stories

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy


no, thanks

Continue to site...