Security
Privacy & Security
Nearly 200 decryption keys were released and confirmed valid by security researchers, which can be used to decrypt and unlock data on infected systems.
Electronic Health Records
Zane Burke told investors said that the same EHR technology used for subs can benefit rural providers that are often in regions with scarce connectivity.
Privacy & Security
Both device manufacturers and providers lack confidence that devices are secure and most won’t get a bigger budget to protect them until a breach strikes, Ponemon Institute says.
Privacy & Security
The security firm stressed the connection to North Korea-linked hackers was purely technical, but there were substantial commonalities in the tools, infrastructure and techniques used.
HIE
Informatics group tells the federal agency that robust internet access is key to ensuring everyone benefits from advances in health IT.
Compliance
The state’s Department of Medical Assistance Services didn’t meet federal security requirements, which could have compromised the integrity of the system.
Privacy & Security
First National Technology Solutions says software updates, constant patching and employee education are musts.
Privacy & Security
ID management has become central to fighting cybercrime as cloud computing and the internet change the nature of access and security, according to University of Pittsburgh Medical Center’s vice president of security.
Privacy & Security
While WannaCry exploited two of the NSA’s leaked hacking tools, EternalBlue uses all seven and has no kill-switch.While WannaCry exploited two of the NSA’s leaked hacking tools, EternalBlue uses all seven and has no kill-switch.
Privacy & Security
Officials said the goal is to provide each of the state’s 170 hospitals with the necessary cyber tools to prevent breaches.