August 10, 2017
Via: FierceHealthcareHealthcare providers that have a dedicated information security executive are more likely to adopt a holistic approach to privacy and security that includes the use of a validated cybersecurity framework, reviewing new technology prior to purchase and testing systems for […]
August 9, 2017
Via: ForbesOne of the monumental shifts we are experiencing in the healthcare industry is the digital decentralization of the care delivery models. Digitization of drugs (therapies), devices, services and business models are democratizing current healthcare systems, unlocking new values by displacing […]
August 4, 2017
Via: medicaldevice-network.comThe US Senator Richard Blumenthal has introduced the Medical Device Cybersecurity Act bill to protect confidential medical information of patients. Intended to protect against hackers, the bill provides cybersecurity protections for medical devices. The move follows ransomware attacks and large-scale […]
July 12, 2017
Via: HealthcareITnewsU.S.-based pharmaceutical kingpin Merck was among many organizations affectedJune 27 by the Petya cyberattack, showing pharmaceutical giants are just as susceptible to attack as hospitals and health systems. The same goes for IT vendors, with Nuance experiencing service outages that lasted longer than two weeks […]
June 20, 2017
Via: Health Data ManagementMany organizations are still overly confident about their data security programs, but in fact they are ill-prepared to defend against a significant cyber-attack. That is the finding of a new study by Sapio Research, which surveyed organizations in the United […]
June 9, 2017
Via: HealthcareITnewsIf you’re a worker with cybersecurity expertise, to paraphrase the old Uncle Sam poster, “Healthcare wants YOU!” It’s well known that there’s a shortage of qualified cybersecurity workers in the United States today. In fact, the lack of information security […]
May 24, 2017
Via: FierceHealthcareIf the last two months are any sign, healthcare organizations appear to be putting more emphasis on adhering to the required 60-day window to report data breaches. In April, it took organizations an average of 51 days to discover a […]
April 24, 2017
Via: Health Data ManagementAccess cannot be freely granted to data—such is the reality of the world today. Unnecessary risk is created if a vendor is allowed to freely access, use or otherwise interact with data. Why go down the risk-filled road when issues […]
April 11, 2017
Via: Healthcare InformaticsAmateur cybercriminals may be shifting towards targeting the healthcare sector using an off-the-shelf ransomware, according to security researchers at Forcepoint Security Labs. Forcepoint is an Austin, Texas-based cybersecurity software company and Roland Dela Paz, a senior security researcher at the […]
March 24, 2017
Via: HITECH AnswersEvery day brings a new report of a security breach or other security based problem within healthcare. The unceasing cycle of issues gives rise to the question of what can and is healthcare doing about security and in particular cybersecurity. […]
March 21, 2017
Via: HitConsultantThe Workgroup for Electronic Data Interchange (WEDI), a nonprofit authority on the use of health IT to create efficiencies in healthcare information exchange has released a new white paper exploring common vulnerabilities exploited by cybercriminals in today’s healthcare environment and […]
March 9, 2017
Via: EmrAndHipaaDavid Chou recently shared this amazing graphic of the “above the surface” and “beneath the surface” impacts from cyber attacks. The above the surface attacks are those that are better know costs related to an incident. The beneath the surface […]
March 9, 2017
Via: Health Data ManagementWith the HHS Office for Civil Rights’ Phase 2 HIPAA audit program in full swing, the American Health Information Management Association has released a toolkit to help covered entities get ready for on-site audits by OCR. According to Kathy Downing, […]
March 6, 2017
Via: Healthcare InformaticsAtlanta-based Emory Healthcare has reported that in January a hacker demanded a ransom after accessing one of the health system’s appointment systems and deleting the appointment information database. The hack affected the records of about 80,000 patients. In a statement […]
January 31, 2017
Via: Health Data ManagementToo many organizations pay only lip service to the practice of encrypting important information, increasing the likelihood that they will suffer a cyber attack. According to a new study from Osterman Research, while email encryption is a “critical” or “very […]
January 23, 2017
Via: Health Data ManagementIt’s worth remembering that 2016 was dubbed the “year of data security” after 90 percent of healthcare providers suffered data breaches in the previous two years. In particular, the Anthem breach of late 2014 and early 2015 got everyone’s attention […]
January 12, 2017
Via: Healthcare InformaticsMost cybersecurity experts predict that data security threats against the healthcare industry will only continue to increase and evolve in 2017 as widespread malicious and criminal hacking poses an increased risk to protected health information (PHI) and healthcare organizations’ information […]
December 30, 2016
Via: HealthcareITnewsHospital executives are investigating new marketing automation channels, such as real-time computer buying, geo-fencing, text messaging and dark posts on social media, according to a new study. But researchers compiling “The State of Digital Marketing in Healthcare in 2017” survey […]
December 20, 2016
Via: Health Data ManagementSince cyberattacks on hospital EHR systems have become a topic of nightly newscasts, no longer is anyone shocked by their scope and veracity. What is shocking is the financial damage the attacks are predicted to cause. During this past June, […]
December 13, 2016
Via: Health Data ManagementCyber attacks hit nine providers and a business associate in the 10 largest hacks of 2016. The number of records accessed were down significantly from 2015, when hackers were able to break into records of large insurers. Here are the […]