Good news in the fight to prevent COVID-19 infections: Researchers report that a digital contact-tracing app rolled out in England and Wales that's designed to keep users' data private and secure is helping to blunt the spread of the pandemic. They urge continuing global uptake of such apps.
From both a regulatory and a security perspective, it’s not enough to simply perform a risk analysis. The HIPAA Security Rule requires and today’s rapidly evolving threat landscape demands that healthcare organizations respond to the risks identified appropriately and effectively.
Read this guide for expert...
New medical device technology makes it possible to deliver better patient care but generates enticing new opportunities for cyberattacks.
Read this ebook to learn how to protect healthcare data.
Within the last few years, digital transformation and Cloud services have increased the
complexity of IT infrastructure, making you reliant on multiple third
parties to keep your data safe. The threat landscape has also increased in breadth and depth with more
attacks, more kinds of attacks and more targeted...
Recently released NIST guidance aims to help healthcare providers better address the security risks posed by picture archiving and communication systems. Michael Holt, a contributor to the document, describes how to put the guidance to use.
In the latest move in its ongoing initiative to enforce a HIPAA provision granting patients the right to access their records, federal regulators have slapped an Arizona integrated healthcare system with a $200,000 fine for failing to provide two individuals with timely records access.
You can’t secure what you can’t see. In fact, gaining visibility and control over all your devices is one of the most important, yet challenging tasks for IT and security teams. The number of connected devices has exploded. At the same time, there are more diverse devices – IoT, IoMT and OT—that are sometimes...
Ransomware and other cyberattacks on healthcare entities globally have increased by about 45% in the last two months, security vendor Check Point Software Technologies estimates.
Security teams are investing more time and resources in securing corporate networks than ever. As they plan for business continuity, remote work, and the transition to the next new normal, CISOs and security buyers are asking for significant budget increases in 2021.
But as security professionals work hard to protect...
Recent disclosures about security issues pertaining to certain medical devices as well as storage devices used in healthcare serve as reminders of the potential risks to patients that must be mitigated.
Perhaps more than any sector, healthcare has been the greatest beneficiary of digital transformation initiatives in 2020. It also has been among the top targets of cyber adversaries. Imperva's Terry Ray discusses how to improve security and compliance amidst transformation.
To be the first to bring a ground-breaking treatment or vaccine to market, pharmaceutical organizations need employees to stay productive no matter where they are or what device they're using. But this greater connectivity is exposing your critically important intellectual property (IP) to countless mobile risks. It's...
To be the first to bring a ground-breaking treatment or vaccine to market, pharmaceutical organisations need employees to stay productive whether no matter where they are or what device they're using t. But this greater connectivity is exposing your critically important intellectual property (IP) to countless mobile...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.