Network Infrastructure

patient records exposed on misconfigured FTP server
By Jessica Davis 01:03 pm May 18, 2018
MedEvolve, a practice management software vendor, left its FTP server open to the public without the need for a login.
cybersecurity password login on hospital computer

Some clinicians share their passwords with nurses in order to complete charts with the idea of “a care efficiency: rather than a risk.

By Jessica Davis 03:07 pm May 11, 2018
From legacy infrastructure to potential medical device hacks, some of the industry’s leading voices opened up about how the industry can begin to combat the inevitable breach.
cerner EHR vendor at himss18
By Tom Sullivan 09:40 am May 09, 2018
Regulations are different internationally and electronic health record systems made in America are too pricey for the rest of the world.
Defense Health Agency for DoD IG
By Jessica Davis 01:47 pm May 08, 2018
Inspector general says Defense Health Agency sites failed to consistently implement technical, physical and administrative protocols and may have violated HIPAA regulations in the process.
Blockchain in healthcare
By Bill Siwicki 02:08 pm May 02, 2018
Organizations said they will advance testing of a secure digital ID proof-of-concept program that is designed to reach millions of consumers, while Trusted Key also announced a $3 million round of funding.
cybersecurity threats
By Jessica Davis 03:01 pm May 01, 2018
The planned update is just the latest move to improve the National Health Services since WannaCry.
ransomware attacks

Center for Orthopaedic Specialists in West Hills, California. Credit: Google Maps

By Jessica Davis 02:27 pm April 26, 2018
Hackers hit the IT vendor of three Center for Orthopaedic Specialists locations in February, which locked out users and encrypted patient data.
healthcare data breach
By Jessica Davis 12:41 pm April 25, 2018
MEDantex left a portion of its customer portal open to the public after it rebuilt its site due to a ransomware attack.
cybersecurity healthcare
By Mike Miliard 09:20 am April 24, 2018
Artificial intelligence-powered threat detection and response can be very valuable – as long as it's researched and deployed with care and planning.
bug bounty program
By Bill Siwicki 01:25 pm April 23, 2018
While more organizations are warming to the concept of paying hackers to discover and report on security vulnerabilities, there's still some confusion and ambiguity about the idea.

Most Read

The Daily Brief Newsletter