Skip to main content

Security

IT Infrastructure
By Jessica Davis | 10:31 am | September 07, 2018
Hackers are constantly innovating attack methods and organizations need to follow suit, by following trends and choosing cybersecurity tools that fit their business needs.
Electronic Health Records
By Jessica Davis | 05:24 pm | September 06, 2018
During the Wednesday confirmation hearing, James Gfrerer said he’d also be an advocate for maintaining VistA during the 10-year process to implement the new Cerner EHR.
IT Infrastructure
By Jessica Davis | 04:26 pm | September 05, 2018
Similar to the notorious SamSam variant that has wreaked havoc on the healthcare sector, the new ransomware only infects crucial assets and resources.
Mobile Health IT
By Mike Miliard | 03:45 pm | August 29, 2018
Although the health system has been repeatedly dinged for lax security practices, most NHS hospitals aren't discouraging use of consumer messaging tools.
Compliance
By Bill Siwicki | 03:09 pm | August 23, 2018
An Internet of Things expert from Travelers discusses equipment maintenance software, smart screens and IoT-linked cabinets.
Privacy & Security
By Jessica Davis | 03:58 pm | August 22, 2018
The hackers went undetected for several weeks at the Portland, Oregon-based health system.
Privacy & Security
By Jessica Davis | 01:59 pm | August 21, 2018
Months after all NHS trusts failed security assessments, a new assessment from a think tank found the majority of hospitals still are leaning on handwritten documentation, and often misplace patient records.
Privacy & Security
By Jessica Davis | 04:48 pm | August 17, 2018
The Georgia provider was hit by two cyberattacks in September 2017, but did not explain when the breach was discovered.
Privacy & Security
By Jessica Davis | 01:48 pm | August 16, 2018
While the state program had a security program in place, it lacked sufficient controls over the data and its operation.
IT Infrastructure
By Jessica Davis | 01:25 pm | August 15, 2018
While CMS Administrator Seema Verma called for the end of fax machine use by 2020, new Check Point research found a hacker could steal data from a flaw in the fax protocol.