Cybersecurity threats pose biggest healthcare hazard, ECRI reports

Malware attacks in healthcare can put patient safety at risk, shutting off access to records, taking down medical devices and interrupting supply chains, according to a new report from the ECRI Institute that puts ransomware and cybersecurity threats at the top of its technology hazards list for 2018. Read about the new report by ECRI […]

3 Ways Healthcare Organizations Can Build Better Cyberdefenses

Read Juliet Van Wagenen list three ways in which healthcare organisations can build better cyber defenses on Health Tech Magazine : Is your healthcare organization as secure as it can be? National Cybersecurity Awareness Month is upon us, and with recent cyberattacks like WannaCry and Petya proving that the healthcare industry needs to be more […]

3 Common Cybersecurity Threats to Healthcare

Read Ryan Black list three common cyber security threats to the healthcare sector on Healthcare Analytics News : Lee Kim, JD, refuses to sugarcoat it. The Healthcare Information and Management Systems Society (HIMSS) cybersecurity expert said threat actors are “super technical,” and that’s bad for healthcare. “Sometimes the defenses that we have in place are […]

What Outdated Medical Devices Mean for a Network — and How to Protect Yours

Read Susan Hall’s article about how outdated medical devices could impact network security of healthcare firm on Health Tech Magazine : Despite an understanding in the healthcare community that unsecure and legacy medical devices are particularly susceptible to cyberattacks, that concern hasn’t necessarily translated into action. Read the full article here.

Education and Simulation Essential for Hospital Cybersecurity

Read Ryan Black’s article about why education and simulation are necessary for preventing healthcare data breaches on Healthcare Analytics News : Lee Kim, JD, is encouraged by healthcare’s recent cybersecurity approach. In a survey conducted by Healthcare Information and Management Systems Society (HIMSS), 85% of healthcare information security professionals said their institutions performed risk assessments […]

Health-Care Industry Increasingly Faces Cybersecurity Breaches

The scenarios are chilling: A busy hospital suddenly cannot use any of its electronic medical records or other computerized systems. The victim of a ransomware attack, the hospital will not regain access without paying those who locked down the records — if at all. Read why cyber security experts say that the healthcare industry is […]

What Are Basic, Essential Healthcare Cybersecurity Measures?

With October being National Cybersecurity Awareness Month (NCAM), OCR highlighted top healthcare cybersecurity measures that all covered entities and business associates should keep in mind. Read about the basic and essential cyber security measures for healthcare firms according to OCR on Health IT Security.

Health-Care Industry Increasingly Faces Cybersecurity Breaches

Read Margaret Steen’s article about how healthcare firms are increasingly being targeted by cyber criminals on Gov Tech : The scenarios are chilling: A busy hospital suddenly cannot use any of its electronic medical records or other computerized systems. The victim of a ransomware attack, the hospital will not regain access without paying those who locked […]

Ward off insider healthcare security threats with this tech

Read Kristen Lee’s tips about how healthcare firms can ward off insider threats on Tech Target : While many fear the nation-state or single basement hacker working their way into a health system, it turns out that one of the greatest healthcare security threats comes from users within an organization. Read her full article here.

Role Of Machine Learning And AI In Healthcare Cybersecurity

Read Jim Massey’s commentary about how machine learning and artificial intelligence can impact healthcare cyber security on Forbes : Security threats are major concerns to healthcare organizations due to the value and vulnerability of clinical data that is being recorded and distributed. Read his full article here.