Cybersecurity

A post today from Krishna Kurapati, CEO of qliqSOFT, Inc., a HIPAA-compliant healthcare messaging application company, is entitled, “Petya” Ransomware Attack: What You Need to Know." In the post, Kurapati describes that, "For the second time in two months, a major ransomware attack has had international implications.

Continue Reading

Hewlett Packard Enterprise (HPE) Security shared a June 2017 report from James Scott, Sr. Fellow, The Institute for Critical Infrastructure Technology (ICIT), entitled "The Necessity of Encryption for Preserving Critical Infrastructure Integrity." This powerful report states the following: "Lately, consumers have not been able to trust public or private entities to secure their data.

Continue Reading

Wannacry? OAuth?

A lot of well-known Healthcare organizations with important names have been impacted by these new threats.

If they can't defend themselves, HOW CAN YOU?

These major global cyber attacks - which occurred over the past few weeks - have occupied worldwide news headlines since. Organizations the world over, reportedly including major hospital systems, transportation providers, and telcos have been impacted. The attack has purportedly spread to over 150 countries around the world.

Continue Reading

An article in the September 26, edition of Becker's Health IT & CIO Review, by Akanksha Jayanthi, entitled, "HIMSS, CHIME seek to separate health IT, health informatics, health information management occupations" , indicates that, as the "Standard Occupation Classification Policy Committee is making revisions to its classifications for 2018, it may consider distinguishing occupations related to health informatics, health information management and health information techno

Continue Reading

In an article earlier this week from Healthcare IT News, Technology Evangelist Nathan Wenzler shares some of the key takeaways from Ponemon's recently published study of Privacy & Data Security in Healthcare.  The bottom line: Healthcare organizations must do more to protect sensitive data from breach threats.  With 91% of respondents falling victim to at least one data breach in the past 2 years, healthcare IT teams must take action.

Continue Reading

In an article yesterday from Healthcare IT News, Managing Editor Erin McCann shares the news that the National Institute of Standards and Technology (NIST) has officially released a long-awaited mobile security guide, specifically written for protecting medical data.  This 82-page book offers healthcare institutions insights into how to bolster mHealth cybersecurity.

Continue Reading

In an article last week from FierceHealthIT, author Katie Dvorak explains how while technology in the healthcare system makes things easier, it also makes things more complicated; specifically from a security perspective.  Security should be a top priority for healthcare organizations since simply having good technical people will no longer stop breaches.

Continue Reading

In a May 8, article on the iHealthBeat.org website, they indicate that, “Cyberattacks are the leading cause of health care data breaches, according to the Ponemon Institute's fifth annual privacy and security report, Healthcare IT News reports (McCann, Healthcare IT News, 5/7).” According to the Ponemon report, which “surveyed 90 health care organizations and 88 business associates to gauge privacy and security trends,” initially, the following:

Continue Reading
Subscribe to RSS - Cybersecurity