Cybersecurity task force seeks new security framework, exemption to the Stark law

In a draft of a cybersecurity report to be released later this month, the Health Care Industry Cybersecurity Task Force called on the government to create new policies that would help healthcare organizations strengthen their cybersecurity. Read about the draft of a cybersecurity report to be released later this month which has asked the United […]

Addressing Cybersecurity Across The Health Care Industry

Read Michael Chertoff and Jason Cook explain how healthcare organisations can address cyber security issues on Forbes : Last week’s global ransomware cyber-attack that upended hospitals across the globe reminds us that every innovation comes with challenges. In all industries, especially the health care industry, connectivity offers tremendous benefits but also increased risk. Read their full […]

Medical Devices Fall Short in Security Best Practices

Over the next 12 months, 67% of medical device makers expect an attack on their devices, but only 17% of these companies are taking significant steps to prevent it, according to a Ponemon Institute study released today by Synopsys. Read about the new the study, Medical Device Security: An industry Under Attack and Unprepared to […]

49% of Orgs Report File Sharing Data Breach in Past 2 Years

With more healthcare organizations looking to cloud computing and file sharing options, PHI privacy and security cannot be overlooked. Failing to account for how these tools interact with sensitive data or work to keep that data secure could lead to a data breach. Read about the new report by Ponemon Institute and Metalogiz report which […]

Identity management the new ‘perimeter’ for hospital cybersecurity

Read Bill Siwicki’s article about how identity management is the new perimeter for hospital cyber security on Healthcare IT News : Protecting a hospital network’s perimeter used to be the guiding principle for security professionals, but today they must focus more on managing the identities of every user, said John Houston, vice president of information security […]

Cybersecurity is lacking amongst US healthcare institutions due in part to a false sense of security

Read why Laurie Fullerton says that healthcare organisation in United States lack in cyber security due to false sense of security on The Drum : The threat of cyberattacks on institutions, including healthcare, is under review after the recent WannaCry ransomware attack that impacted the UK’s National Health Service (NHS) with the US healthcare’s own […]

Health Care Task Force Pre-Releases Report on Cybersecurity Days Before Ransomware Attack

Last week, the Health Care Industry Cybersecurity (HCIC) Task Force (the “Task Force”) published a pre-release copy of its report on improving cybersecurity in the health care industry. The Task Force was established by Congress under the Cybersecurity Act of 2015. Read about the cyber security report released by Health Care Industry Cyber Security Task […]

Despite ransomware siege, 80% of consumers trust healthcare with their data

Healthcare is trusted above all other industries to protect personal information, a new Ponemon Institute report has found, even though nearly half of all breached records tie back to a healthcare organization. Read about the new report by Ponemon Institute which reveals that about 80 percent of the 549 surveyed consumers said they trusted healthcare […]

Addressing Cybersecurity Across The Health Care Industry

Read Michael Chertoff and Jason Cook’s article about how healthcare organisations can address cyber security issues on Forbes : Last week’s global ransomware cyber-attack that upended hospitals across the globe reminds us that every innovation comes with challenges. In all industries, especially the health care industry, connectivity offers tremendous benefits but also increased risk. Read […]

The Looming Threat of Health Care IoT Devices

Read Michael Ash’s article about the looming threat of healthcare Internet of Things devices on Security Intelligence : A computer generation or two ago, IT managers fought a futile uphill battle to prevent rogue PCs from infiltrating the workplace, a battle fought largely in the name of data security. Their thinking was that if IT couldn’t […]