Security
SPONSORED
This allows issues to be caught early on, according to a practising nurse and nursing informatics expert at Imprivata.
Cybersecurity In Focus
Broad access to artificial intelligence has quickly evolved a new arms race in which healthcare security teams should implement AI from the ground up in their platforms and processes – and hold vendors' "feet to the fire" – to keep up with threats.
With virtual reality and generative artificial intelligence infused in nurse training programs, students hone their documentation skills and gain more confidence in patient care, says North Carolina Central University's Tina Scott.
The Michigan-based health system has told patients, for the second time in three years, that personal and protected health information has been breached during a ransomware attack.
Homeland Security is calling for vigilance against state-sponsored CyberAv3ngers and other pro-Iranian hacktivists, who have a history of attacking operational control and IoT systems to steal access and control devices.
New research shows that 75% of healthcare leaders increased their device and security budgets over the last 12 months, and they're willing to shell out for advanced protection or built-in exploit prevention.
After SimpleHelp disclosed a security vulnerability in its remote monitoring and management tool earlier this year, threat actors are gaining access to U.S. networks and exploiting the flaw to steal data before shutting down operational systems.
Small providers struggle for survival, and security risks only exacerbate the challenge. But by sharing technologies and making use of resources like virtual CISOs, some hospitals are staying ahead of their biggest closure risks.
After canceling some services due to a system-wide cybersecurity incident, Ohio-based Kettering Health said persons claiming to be team members are trying to scam patients by phone, and the health system has halted certain billing activities.
Cybersecurity In Focus
Healthcare organizations can stave off ransomware attacks with highly gated permissions that lock out common intrusions, say Intermountain cybersecurity leaders, who have found success with the approach.