It’s not uncommon for hospitals and health systems to have questions about what they need to do when it comes to technical testing to be in compliance with the HIPAA Security Rule. Unfortunately, there is no one-size-fits-all answer for every organization, and there's much more to technical testing than checking a...
Artificial intelligence offers huge opportunities to improve healthcare. Yet with that opportunity comes significant cybersecurity risks.
Healthcare leaders must be equipped to navigate an increasingly complex AI landscape, manage risks and unlock the full benefits of AI to deliver enhanced patient care. During...
The threat landscape has evolved significantly in the past year or so - particularly for small to midsize healthcare entities. Steve Akers of Clearwater says these organizations are particularly vulnerable because their first-line cyber defenders are their highest risk variable.
Healthcare leaders have been employing user access monitoring for some time now, but how and to what extent organizations leverage this as part of their cybersecurity strategies can vary. Here are some questions around user access monitoring that aren't discussed as frequently as they should be.
Healthcare is under siege from relentless cyber attacks, all while grappling with IT and clinical staff shortages. Shockingly, a recent report reveals 93% of healthcare organizations have suffered breaches in the last two years.
With stolen credentials like passwords, external attackers can pursue more entitled,...
If you've ever confused the three assessments required under the HIPAA security rule or interchanged one to meet multiple requirements—you're not alone. But knowing the differences is critical because, at best, confusing them is risky and non-compliant, but worse, it leaves gaps in your cybersecurity strategy that...
Struggling to Balance Security and Compliance in Healthcare? See How One Company Succeeded
As an IT leader at a mid-sized healthcare organization, you face immense pressure:
Meet HIPAA, PCI DSS, and other strict compliance regulations
Detect and respond to constant cyber threats
Modernize infrastructure and...
As a fast-growing company with a startup mentality, a mid-sized healthcare company needed a detection and response security solution that acted like an extension of their current team. But they were frustrated by the decline in their existing cyber security reliability.
“Honestly, it was just frustrating. A lot...
When it comes to managing cyber risk, hospitals and health systems often find themselves racing to check a box or meet an annual deadline. Owensboro Health's Chief Information Security Officer (CISO), Jackie Mattingly, decided to find a better approach. Because Owensboro had already experienced a breach years prior,...
Healthcare Delivery Organizations (HDOs) have valuable health information and need to continuously ensure that technology and information are available to provide essential patient care. Ransomware attackers are sophisticated and opportunistic, understanding that HDOs are lucrative targets because of organizational...
As healthcare organizations introduce new technology into their environments, questions often arise as to how and where to allocate resources in order to best reduce cyber risk. This report—a collaboration between KLAS and the American Hospital Association (AHA)—is intended to provide high-level insights into the...
Ransomware attacks on healthcare organizations can be a life-or-death situation. The onset of COVID-19 introduced new risk factors to HDOs, including remote work, new systems to support it, staffing challenges, and elevated patient care requirements. There’s been a great deal of media coverage on the rise of...
It used to be a stray printer on a network, but today shadow IT comes in all shapes and sizes - and poses serious security threats. Jeff Keating and Jaineesh Davda of FormAssembly discuss how to manage shadow IT and protect your critical data.
Resilience, not just compliance, is becoming healthcare's primary goal in managing cyber risk. Moving to a more resilient state requires continuous cyber risk management, which requires knowing how an adversary thinks and attacks to ensure that the appropriate safeguards are in place.
What does it look like when an attacker accesses your network, and how can you mitigate the threat before it becomes a crisis?
This eBook reveals the various ways a real-life attack played out within the environment of a healthcare business associate. It documents how the attack happened and the moves and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.