Privacy & Security

Fax machines can breach a network

Credit: YouTube

By Jessica Davis 12:25 pm August 15, 2018
While CMS Administrator Seema Verma called for the end of fax machine use by 2020, new Check Point research found a hacker could steal data from a flaw in the fax protocol.
FDA building

Credit: FDA.gov

By Jessica Davis 09:53 am August 15, 2018
McAfee researchers show just how easy it is to hack into devices -- but new MedCrypt data shows government guidance may be putting device manufacturers on the right trajectory to shore up this real threat.
exterior of Sobeys pharmacy in Windsor Nova Scotia

Sobeys pharmacy in Windsor, Nova Scotia. Credit: Google Maps

By Lynne Minion 11:27 am August 13, 2018
She snooped in the EHRs of nearly four dozen people over two years.
blockchain digital ledger technology of patient records
By Bill Siwicki 07:16 am August 13, 2018
The technology alone won’t fix patient ID issues but it can bring some of the data accessibility, interoperability, integrity and security hospitals need.
cybersecurity computer screen breaches
By Jessica Davis 04:29 pm August 09, 2018
More than 3 million patient records were breached between April and June, highlighting an even bigger issue: Risk increases over time without proper education or reporting.
ClearData cloud security at HIMSS18 booth in Las Vegas
By Mike Miliard 03:55 pm August 09, 2018
Company says expanding coverage for Amazon, Google Cloud, Microsoft and others, makes it easier for hospitals to comply with a host of data privacy regulations.
Qliq secure texting app

Qliq secure texting app. Credit: YouTube

By Bill Siwicki 03:35 pm August 09, 2018
A new communication process in the emergency department helped the hospital reduce the time it took a patient to get to their new unit by almost half an hour.
Anahi Santiago, CISO and Christiana Care Health System talking at Healthcare Security Forum in San Francisco
By Tom Sullivan 04:48 pm August 08, 2018
Making security personal to employees and engaging future generations to rekindle the dwindling talent pool are a good start.
cybersecurity authentication logs on computer screen

A sample screen snap of authentication logs. Researchers found OpenEMR vulnerabilities easily let anyone bypass the patient portal authentication with unrestricted upload errors.

By Jessica Davis 02:57 pm August 08, 2018
Security researchers notified the open source EHR managing software of nearly 30 critical vulnerabilities – the second set of vulnerabilities found in a year.
mexican flag
By Jessica Davis 04:28 pm August 07, 2018
A configuration error left a database filled with healthcare data exposed on the internet, and the data could be accessed and changed by anyone without a password.

Most Read

The Daily Brief Newsletter