Security
Single points of failure could open the door for hackers to take out significant portions of a hospital's medical network, expert at HIMSS16 says.
(SPONSORED) The major trend in healthcare in 2016 and beyond is how to nail down the issue of interoperability.
The telemedicine tech vendor is betting the ubiquitous Microsoft systems will enable a more robust, secure and scalable collaboration platform.
SPONSORED
(SPONSORED) The average global cost of a data breach as a result of a lost or stolen record is $154.
A new agreement with FHA will allow DirectTrust's federal partners to operate their Direct implementations within its Security and Trust Framework.
Cybersecurity concerns have become much more than a hypothetical for vulnerable hospitals, most of whom are finally realizing just how vulnerable they are.
The same week the Hollywood Presbyterian attack was making headlines around the world, another species of ransomware – aptly named "Locky" – was first observed in the wild.
It seems simple enough: If a piece of medical equipment is storing, receiving, transmitting, or processing electronic protected health information, it falls within the category of devices that are covered under HIPAA.
Aiming to help HIPAA covered entities strengthen their cybersecurity preparedness, HHS Office for Civil Rights has published a crosswalk identifying mappings between NIST's Framework for Improving Critical Infrastructure Cybersecurity and the HIPAA Security Rule.
Too many healthcare organizations are focused on securing the wrong assets, leaving them vulnerable to cyberattacks and putting patients at risk, a new report from Independent Survey Evaluators claims.