The widespread use of SolarWinds software means many organizations are now scrambling to determine whether they too may have suffered a breach. Here are some remediations and mitigations that can help get a handle on the issue.
Collaboration tools are undergoing drastic version updates and feature overhauls on a very frequent basis, which force security departments to keep a close eye on upcoming changes to determine whether their standards will still be met.
When working with big data, small inconsistencies in data entry matter. Leaving the task of cleaning up registration or demographic data to data scientists or IT staff will be expensive.
"Data is the currency of the next century," says Brian Ahier. And nowhere are health data and data management processes discussed, analyzed and examined more than at the HIMSS Annual Conference and Exhibition.
Last week we all read another sobering account of the disruption that cyber incidents can cause. The ransomware attack at Hollywood Presbyterian Medical Center was despicable in its nature and alarming in it what it says about the overall preparedness of healthcare to deflect these threats.
One of my all-time favorite Star Trek original series episodes is entitled "The Trouble with Tribbles." In this episode, Captain Kirk urgently races to a space station that's in distress.
The real enemies of good cybersecurity -- and its closely related cousin, patient safety -- are often intangible: apathy, ignorance and indecision. Not the many threats we face today.
In November, CMS updated guidance that previously called for health plans to update provider directories on a monthly basis. Unfortunately for patients, the data is now only required to be updated quarterly.
It's not exactly a secret that there's a worldwide shortage of experienced cyber security professionals. At least one widely-cited report has put the figure at over a million unfulfilled positions.
While cyber-attackers are becoming ever sophisticated at stealing information from business systems, gaining entry into those systems is relatively easy because employees, vendors and sometimes customers are not very sophisticated at keeping them secure.