Skip to main content

Security

IT Infrastructure
By Jessica Davis | 05:22 pm | October 05, 2018
The healthcare sector is well-aware that medical devices are vulnerable, but it’s hard to obtain the extra resources to fix the issue.
Privacy & Security
By Mike Miliard | 11:24 am | October 05, 2018
A new CHIME-KLAS survey of CIOs, CISOs and other security leaders finds that few are confident in their ability to protect patient safety and prevent disruptions from cybercriminals.
Cybersecurity
By Laura Lovett | 11:16 am | October 04, 2018
BlackBerry' new healthcare-related security products include a blockchain system for medical data and operating system for secure medical devices.
Cybersecurity
By Dan Costantino | 10:42 am | October 04, 2018
Penn Medicine CISO Dan Costantino outlines the steps to gathering information so you can plan strategically and educate the business about threats.
Interoperability
By Tom Sullivan | 01:48 pm | October 03, 2018
More than 70 percent of respondents ranked biometrics, such as fingerprinting and facial recognition, as the top choice for a unique identifier while hospital executives raised some questions.
IT Infrastructure
By Mike Miliard | 09:00 am | October 03, 2018
The prospect of hackers gaining access to remote access to networked IT systems and connected medical devices raises concerns about serious safety risks.
Security
By Jessica Davis | 09:00 am | October 03, 2018
Simulated attacks on a healthcare organization can help infosec leaders assess their security posture, but not all pen testers are created equal and not every provider is ready to be tested.
By Mike Miliard | 09:46 am | October 02, 2018
A 16-year-old high school student built a website around public data from the NIH ClinVar archive, helping clinicians advance genomic treatments, and says similar innovations depend on more freely-available data.
Cybersecurity
By Jessica Davis | 09:00 am | October 02, 2018
Part one of our cyber insurance series focuses on cyber policies and how organizations need to do their homework to ensure they’re covered after a breach.
Cybersecurity
By Jessica Davis | 10:50 am | October 01, 2018
Take our quick survey and we’ll report the results back so you can learn about what your peers are seeing in terms of breaches, hacks and other cybersecurity events.