Skip to main content

Security

Privacy & Security
By Jessica Davis | 04:24 pm | May 25, 2017
Nearly 200 decryption keys were released and confirmed valid by security researchers, which can be used to decrypt and unlock data on infected systems.
Electronic Health Records
By Tom Sullivan | 02:16 pm | May 25, 2017
Zane Burke told investors said that the same EHR technology used for subs can benefit rural providers that are often in regions with scarce connectivity.
Privacy & Security
By Tom Sullivan | 11:58 am | May 25, 2017
Both device manufacturers and providers lack confidence that devices are secure and most won’t get a bigger budget to protect them until a breach strikes, Ponemon Institute says.
Privacy & Security
By Jessica Davis | 11:30 am | May 25, 2017
The security firm stressed the connection to North Korea-linked hackers was purely technical, but there were substantial commonalities in the tools, infrastructure and techniques used.
HIE
By Mike Miliard | 04:51 pm | May 24, 2017
Informatics group tells the federal agency that robust internet access is key to ensuring everyone benefits from advances in health IT.
Compliance
By Jessica Davis | 04:24 pm | May 24, 2017
The state’s Department of Medical Assistance Services didn’t meet federal security requirements, which could have compromised the integrity of the system.
Privacy & Security
By Bill Siwicki | 01:37 pm | May 24, 2017
First National Technology Solutions says software updates, constant patching and employee education are musts.
Privacy & Security
By Bill Siwicki | 03:22 pm | May 23, 2017
ID management has become central to fighting cybercrime as cloud computing and the internet change the nature of access and security, according to University of Pittsburgh Medical Center’s vice president of security.
Privacy & Security
By Jessica Davis | 02:15 pm | May 23, 2017
While WannaCry exploited two of the NSA’s leaked hacking tools, EternalBlue uses all seven and has no kill-switch.While WannaCry exploited two of the NSA’s leaked hacking tools, EternalBlue uses all seven and has no kill-switch.
Privacy & Security
By Jessica Davis | 11:00 am | May 23, 2017
Officials said the goal is to provide each of the state’s 170 hospitals with the necessary cyber tools to prevent breaches.