Organizations that work with or within the healthcare industry need to prioritize and manage security and privacy-related risk and compliance programs. As the global standard for safeguarding information, HITRUST delivers a scalable, prescriptive, and certifiable framework that enables organizations to demonstrate...
Organizations that work with or within the healthcare industry need to prioritize and manage security and privacy-related risk and compliance programs. As the global standard for safeguarding information, HITRUST delivers a scalable, prescriptive, and certifiable framework that enables organizations to demonstrate...
The challenge: Universal Health Services, Inc. is one of the nation’s largest healthcare providers, with nearly 90,000 employees and almost 400 unique sites across 39 states. With hundreds of thousands of connected devices being tracked manually in error prone process, leading to major inconsistencies and lack of...
A new initiative aims to create a standards-based nationwide patient credential and matching ecosystem to ultimately improve matching patients with their electronic health information, says Scott Stuewe, CEO of DirectTrust, the nonprofit, vendor-neutral organization that is leading the effort.
IoT, cloud migrations, endpoint proliferation, hybrid workplaces - how are organizations in the pharmaceutical industry adapting to this new threat landscape? Troy Ament and Aidan Walden of Fortinet discuss the cybersecurity gaps specific to SAP deployments and how to fill them.
The cost of a data breach is mighty. And for healthcare entities, the cost of a HIPAA violation also can prove costly. Greg Hoffman of Paubox shares five critical steps you might be overlooking to ensure emails remain HIPAA-compliant and tells how to take compliance responsibility out of human hands.
The White House is seeking fiscal 2023 budget increases for the Department of Health and Human Services, including a boost in funding for cybersecurity initiatives including medical device security and regulatory and enforcement efforts related to secure health data exchange.
The Health Information Sharing and Analysis Center is closely assessing the Russia-Ukraine war to assist its members, as well as other healthcare sector entities, to prepare for the potential known and yet-unknown cybersecurity threats that could affect them, says H-ISAC President Denise Anderson.
The $1.5 trillion fiscal 2022 spending bill approved this week by Congress provides modest funding increases - far below what was requested - for two key Department of Health and Human Services' agencies involved with the protection of health data. It is headed to President Biden for his signature.
Federal regulators have released the final versions of the long-awaited Trusted Exchange Framework and Common Agreement, which provide a governance framework to promote secure, interoperable nationwide health information exchange - an effort that has been in the making for years.
The onset of COVID-19 introduced new risk factors to HDOs, including remote work, new systems to support it, staffing challenges, and high patient care requirements. There has been a great deal of media coverage on the rise of cyberattacks such as ransomware within the healthcare industry and beyond.
Read this...
The healthcare and pharmaceutical industry is a target for both criminal and state-sponsored threats.
More large healthcare data breaches were reported in 2020 than in any other year. Additionally, 2021 has seen five consecutive months where industry data breaches have been reported at a rate of two or more per...
Healthcare providers are not technology companies – however, increasingly everything they do is underpinned by technology, and never more so than in today’s digital world. COVID-19 has underlined the need for a fully functional healthcare and pharmaceutical ecosystem. It has also demonstrated the fragility of the...
Although the federal information blocking rule spells out practices that are not considered violations of the regulation, healthcare entities must carefully assess the validity of privacy or security concerns before denying access, exchange or use of patient data, says attorney Adam Greene.
Legacy approaches to data security struggle to cope with the increased regulation and enhanced threat environment that healthcare organizations face because of the limitations imposed by their architectures, approaches, limited scope, and slow adoption of the modern methods required to keep healthcare organizations...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.