By Art Gross – In 2018, 71% of ransomware attacks targeted small businesses, according to a report by Beazley Breach Response Services. It’s clear that small businesses are a cybercriminals favorite target, yet many remain unprepared to handle a cyber-attack.
By Marty Puranik – While the majority of HIPAA violations involve electronic data breaches, the HIPAA Security Rule requires that healthcare providers and business associates implement “physical safeguards for all workstations that access ePHI to restrict access to authorized users.”
By Patrick Yee – One of the biggest trending topics within the healthcare sphere is something that, if all goes well, can be completely invisible. And if something goes wrong, it has the potential to create a crisis-level situation for your organization.
ICIT publishes An Analysis of Responses to Senator Warner’s Health Sector Cybersecurity Inquiries: The Benefits of Proactive Engagement and What We Can Glean from These Questions and Responses.
It has been four years since our first panel discussion addressing the growing and alarming rise of cybersecurity threats to healthcare. Yet, despite the addition of security protocols, and training to thwart hacking incidents, the industry continues to be plagued.
By Arshad Noor – The healthcare industry has a huge responsibility when it comes to information security and protecting sensitive PHI while abiding by its “duty of care” principles. However, the industry continues to suffer large data breaches despite…
By David Holtzman – State governments are not waiting for the United States Congress to pass a comprehensive national set of data privacy and cybersecurity standards. Each of the 50 states now has its own breach notification laws, with nearly one-half adopting data security…
The HIMSS Global Conference & Exhibition brings together 45,000+ health information and technology professionals, clinicians, executives and market suppliers from around the world. Exceptional education, world-class speakers, cutting-edge products and powerful networking are hallmarks of this industry-leading conference. When: February 11-15, 2019 Where: Orange County Convention Center, Orlando FL Hashtag: #HITsecurity Find more Cybersecurity, Privacy […]
By Janet Vogel – The recently-opened Health Sector Cybersecurity Coordination Center (HC3) has been buzzing with the sound of industry collaboration and coordination. HC3 will host tours, and brief stakeholder organizations to share capabilities and services.
By Suzanne B. Schwartz – Ensuring medical devices are safeguarded from cyber intrusions is a shared responsibility across the medical device ecosystem. At the FDA, we deal with cybersecurity in the context of the total product lifecycle of a device.
By Art Gross – It’s no secret that employees violate security policies. Whether we’d like to admit it or not, there’s a good chance we have all violated a security policy once upon a time.
By Sonia Arista – Most cybercriminal behavior can be reduced to two basic economic drivers. The first is to look for targets with valuable resources that can be easily turned into profits. And the second is to expend as few resources as possible to access those resources.
OUR STREAMING RADIO STATION
Our Podcast Channel
Miss any episodes of your favorite HealthcareNOW Radio shows? Find them all on our SoundCloud Channel. Play or Download Here
Get Our eNews Digests
EHR Incentive Program News
More Top Headlines
- Getting to Zero Patient Bad Debt
- Lifting the U.S. Ban on a National Patient Identifier: 3 Things to Know
- Operating Rules for Payment-Related Transactions
- KHN’s ‘What The Health?’: Gun Violence And The Politics Of Public Health
- There is No Big Moment
- See all our sites aggregated content on HealthITAnswers.net