Top

Tag: Privacy & Security


Uncategorized

What to look for when hiring healthcare cybersecurity pros

September 5, 2017

Via: HealthcareITnews

Healthcare has special challenges securing information and devices. The consequences of a successful hack can be, at their worst, extreme results on people’s health and well-being. Medical records are worth more on the black market than identity data, and thus […]


Innovation, Medical Devices

FDA finalizes cybersecurity guidance for medical devices

December 29, 2016

Via: HealthcareITnews

On Dec. 27, the U.S. Food and Drug Administration issued a final guidance addressing the cyber vulnerabilities in medical devices, outlining how manufacturers should maintain security of internet-connected devices such as pacemakers and insulin pumps. With the guidelines, the FDA […]


Uncategorized

Concerto unveils cloud platform for healthcare

December 19, 2016

Via: HealthcareITnews

Concerto Cloud Services launched a platform featuring built-in HIPAA compliance from the application down through the physical layer. The service, called the Concerto Cloud for Healthcare, also offers hybrid deployment capabilities, with integrations across the Concerto private cloud, Microsoft Azure […]


Uncategorized

CISO: Security must work within workflow

May 15, 2015

Via: Healthcareitnews

“The speed at which everything is happening is quicker than ever, and IT needs to be more agile than ever”, said Connie Barrera, director information assurance and CISO of Miami-based Jackson Health System, speaking Wednesday at Citrix Synergy 2015 in […]


Uncategorized

Cybercrime price tag to reach $2 trillion

May 14, 2015

Via: Healthcareitnews

If you haven’t gotten serious about data cyberattacks at your organization, now’s the time to do so. Because they’re about to hit companies worldwide with a $2.1 trillion price tag. At least that’s according to new research published by Juniper […]


Uncategorized

5 ways IT vendors put customers’ PHI at risk

May 5, 2015

Via: Healthcareitnews Blog

Warning to technology vendors that service the healthcare industry: nearly half of serious data breaches occur in the healthcare sector and the majority are caused by a third party. There are five common ways technology vendors set themselves up – […]