Why is risk management so difficult for so many healthcare organizations? Cris Ewell, CISO at University of Washington Medicine, offers insights in this video interview.
Encrypting healthcare data is a no-brainer, right? It keeps your organization off the Wall of Shame in the event of a breach, and it's just the right thing to do. So, why are so many healthcare entities still failing to encrypt?
Upgrading endpoint protection is an important step toward mitigating the risk of sophisticated ransomware and other malware attacks, says George Kaminski of Palo Alto Networks.
When a medical device malfunctions, many healthcare organizations don't realize the problem might be related to a cyberattack, says Rob Bathurst of Cylance.
As more organizations take advantage of cloud computing, it's essential that they set precise security expectations with their vendor partners, Carson Sweet of CloudPassage says in this video interview.
A lack of incident response planning often leads to an unanticipated series of serious consequences for organizations that experience data breaches, Joey Johnson, CISO of Premise Health, says in this video interview.
Healthcare organizations should consider using the PCI Data Security Standard as a framework that can help them select appropriate security controls, says Christopher Strand of Carbon Black.
Organizations in all sectors need to be aware of newly emerging insider threats, including those tied to the dark web, Michael Theis of Carnegie Mellon's CERT Insider Threat Center explains in this video interview.
In a sign of progress, more small healthcare organizations are collaborating with each other - and with their electronic health records vendors - to bolster their information security efforts, says Mitchell Parker, CISO at Indiana University Health.
Cloud-based services can be both a "blessing and curse" when it comes to dealing with security, says John Houston, CISO and associate counsel for the University of Pittsburgh Medical Center, who explains why in this video interview.
When physicians and nurses use their own mobile devices to access clinical information and communicate with patients, an advanced form of encryption can help ensure all sensitive data remains secure, Jonathan Cohen of Synchronoss explains in this video interview.
To combat breaches involving insiders, organizations need to limit employees' access to data and more closely monitor access activity, security expert David Gibson of Varonis says in this video interview.
The security of any organization can be rated based on careful research of information available on the public internet and the dark web, Sam Kassoumeh of SecurityScorecard explains in this video interview.
To help combat a surge in phishing attacks that spread malware, Cooper University Health Care has set up a system for employees to play an active role in the battle, Phil Curran, CISO and chief privacy officer, explains in this video interview.
What information security lessons can the healthcare sector learn from the Department of Defense? Dave Summitt, who has worked in both sectors, shares insights in this video interview.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.