New York, NY, June 15, 2017 – Derive Technologies (also comprising the dedicated Derive Healthcare practice) announced today that CRN®, a brand of The Channel Company, has named Derive to its 2017 Solution Provider 500 list. The Solution Provider 500 is CRN’s annual ranking of the largest technology integrators, solution providers and IT consultants in North America by revenue.
An article in the June 9, edition of Healthcare IT News asks: "How would you like a devious Christian Slater breaking into your doctor’s computers, altering the dosages on your prescriptions? No? Well, HP has created a video series to show you just what would happen in that scenario." The article paraphrases Slater's narrative in the HP Studios, Lance Acord directed, second part of "The Wolf" HP Print and Device Security web video series: "Wolves hunt for the weak, he says...
Hewlett Packard Enterprise (HPE) Security shared a June 2017 report from James Scott, Sr. Fellow, The Institute for Critical Infrastructure Technology (ICIT), entitled "The Necessity of Encryption for Preserving Critical Infrastructure Integrity." This powerful report states the following: "Lately, consumers have not been able to trust public or private entities to secure their data.
A lot of well-known Healthcare organizations with important names have been impacted by these new threats.
If they can't defend themselves, HOW CAN YOU?
These major global cyber attacks - which occurred over the past few weeks - have occupied worldwide news headlines since. Organizations the world over, reportedly including major hospital systems, transportation providers, and telcos have been impacted. The attack has purportedly spread to over 150 countries around the world.
Derive Healthcare has been monitoring news all weekend about, according to reporting from Brian Fung of The Washington Post”, in the 5/14 article entitled, “Computer security experts fear second wave of ‘biggest ransomware attack ever’”, the “malicious ‘ransomware’ attacks that seized computers worldwide Friday and held those systems hostage…” According to the article, the attacks, which first affected Healthcare, “are likely to worsen this week as millions of people return to work — forcing them to di
A May 5, article by James LoPresti, on Healthcare Daily Online, noted that, "according to a recent study from CIT," healthcare executives are "optimistic about a number of healthcare technology trends, with 71% expecting revenue to increase in 2016."
LoPresti went on to further quote the CIT study, from April 2016, wherein, "Healthcare executives have a generally positive outlook for the industry over the coming year... and are optimistic about mergers and acquisitions, increased revenue and advances in healthcare technology."
In an article earlier this week from Healthcare IT News, Technology Evangelist Nathan Wenzler shares some of the key takeaways from Ponemon's recently published study of Privacy & Data Security in Healthcare. The bottom line: Healthcare organizations must do more to protect sensitive data from breach threats. With 91% of respondents falling victim to at least one data breach in the past 2 years, healthcare IT teams must take action.
In an article yesterday from Healthcare IT News, Managing Editor Erin McCann shares the news that the National Institute of Standards and Technology (NIST) has officially released a long-awaited mobile security guide, specifically written for protecting medical data. This 82-page book offers healthcare institutions insights into how to bolster mHealth cybersecurity.
In an article last week from FierceHealthIT, author Katie Dvorak explains how while technology in the healthcare system makes things easier, it also makes things more complicated; specifically from a security perspective. Security should be a top priority for healthcare organizations since simply having good technical people will no longer stop breaches.
In an article this week from Healthcare IT News, author Chris Bowen describes how having direct access to patients' personal health records leads cyber thieves directly to them. According to IBM research, "the vast majority of cybercrime is highly organized and generating unprecedented profits."