Privacy & Security
01:45 pm November 11, 2019
Sharing of threat information across stakeholders helps create situational awareness – not just for individual organizations but for the healthcare industry as a whole, says one expert.
11:06 am November 07, 2019
The health system will pay $3 million to settle with OCR and take corrective action after protected health information was left unencrypted on lost and stolen mobile devices.
02:43 pm November 06, 2019
Knowing what to do is only half the battle, say keynote speakers Michael Coates and Dr. John Halamka. Next month's event will also focus on how to make good practices ubiquitous.
02:18 pm November 05, 2019
The network-based cybersecurity technology acts as an early warning system, giving the CISO and his team a high degree of visibility into network activity.
01:52 pm November 05, 2019
The number of healthcare organizations served by DirectTrust health information service providers and engaged in Direct exchange was up nearly 75% in Q3. New members include Konica Minolta and the Social Security Administration.
Healthcare data breaches will cost industry $4 billion by year's end, and 2020 is poised to be worse
02:54 pm November 04, 2019
Providers continue to be the most targeted organizations for industry cybersecurity breaches, with nearly 4 out of 5 breaches.
01:03 pm November 01, 2019
The cybersecurity compliance company says Backbone's advisory services will help clients manage ever-changing infosec and privacy demands, such as the third-party audits required for EPCS, the privacy demands of GDPR and more.
12:29 pm October 30, 2019
A security expert says discover assets on a network, perform vulnerability assessments, embrace identity governance, perform privileged access management, hire white hat ethical hackers and more.
12:39 pm October 23, 2019
Three healthcare cybersecurity experts showcase the most effectual strategies CIOs and CISOs can take when erecting defenses against criminals seeking valuable patient information.
01:54 pm October 21, 2019
Email cyberattackers frequently use certain keywords in their subject lines, according to Proofpoint, and tend to send their salvos at certain advantageous times of day.