Strengthening Cybersecurity: Virtual Software for Medical Devices
By Sarianne Gruber – More and more medical devices are becoming smarter, and close to 15% are already smart and are on the network. The…
Read MoreBy Sarianne Gruber – More and more medical devices are becoming smarter, and close to 15% are already smart and are on the network. The…
Read MoreBy Grant Elliott – An atmosphere of vigilance and cybersecurity as a cultural norm within an organization is essential. Otherwise, we face a situation where cybercriminals continually re-write the rules. That’s unacceptable.
By Anita Sathe – Cloud technology has done wonders for the healthcare industry. It’s enabled medical professionals to get aspects of their jobs done more quickly, easily and flexibly and it’s allowed hospitals and private practices to scale their IT in an efficient, cost-effective manner.
By Steve Curren – Health records possess a wealth of critical information, and the ability of healthcare professionals to quickly access them can be vital to ensuring positive patient outcomes. However, these records also contain information that is valuable to cyber criminals.
By David Harlow – The report contains 100 recommendations but begins with the diagnosis: the patient is in critical condition, there is a severe lack of security talent, the system relies on vulnerable legacy equipment, Meaningful Use has driven the system prematurely into an “over-connected” state …
By William A. Hyman – Readers in this space are well aware of cybersecurity threats, and the need for affirmative security activities to prevent threats from becoming crises. Risk assessment is part of this agenda…
Don’t miss David Harlow and his guest David Finn, security expert from Symantec on this weeks HIPAA Chat. Register now and get your questions answered on Thursday, May 25th at 1pm ET.
By Matt Fisher – The ability to protect and secure digital information is under constant threat. Attackers of all sorts force their way into systems, trick individuals into providing access, and otherwise access data that is not their own.
By John Nye – The US Department of Health and Human Services, OCR, published an advisory in the March issue of its “Cybersecurity Newsletter” warning of a well-known attack method known as the man-in-the-middle (MitM) attack.