Health IT Security and Compliance

How to Conduct a Cybersecurity Risk Assessment for Your Hospital’s ‘Forgotten’ IoMT Devices

By Ellie Gabel – Forgotten Internet of Medical Things (IoMT) devices often sit quietly on hospital networks, but they can become some of the most dangerous blind spots for health care organizations. Left unpatched or unmanaged, these devices provide easy entry points for ransomware attacks, patient data theft and service interruptions that disrupt clinical operations.


Free the Data

By Matt Fisher – Access to data and the enablement of data flow are significant issues and concerns within healthcare. In particular, individuals often have a hard time getting to their own data. Those difficulties exist even with different regulations in place designed to promote and require access to data.



A New Era, Few Guardrails: Strategies for Healthcare Leaders to Mitigate AI Risks Today

By Andrew Mahler – Imagine a large health system implementing an advanced AI-powered imaging tool designed to assist radiologists in identifying abnormalities in chest CT scans. The AI vendor’s marketing materials include data demonstrating faster turnaround times and reduced error rates, promising enhanced efficiency and accuracy.




The Cost of Catching Up

By Erik Eisen – Why Healthcare Practices Can’t Afford to Treat Cybersecurity Like a To-Do List. I’ve heard the fear and anxiety in the wake of a cybersecurity incident, “I wasn’t scared when it happened. I was scared when I realized how long we’d ignored it.” That’s the problem. “Cybersecurity” has become white noise.


Do Your Risk Analysis

By Matt Fisher – The drumbeat of settlement agreements for alleged HIPAA violations by the Office for Civil Rights is continuing along with the consistent finding that the required risk analysis did not occur. The consistent announcement of settlements offers regular reminders to the healthcare industry that OCR is watching and expecting compliance to improve.