Securing the health environment: Evolving cyberthreats demand shifts in strategy
<p>Barely a day goes by without news of a new malware variant, zero day threat or medical device vulnerability. Hospitals and health systems have come to understand in recent years – with many learning the hard way – that their mission-critical IT systems are facing a relentless and determined threat from innumerable cybersecurity bad actors.</p>
<p>To survive in this fraught new era, healthcare organizations need agile, adaptable and forward-thinking strategies to safeguard their most important asset: data. In August, Healthcare IT News, along with our sister sites, MobiHealthNews and Healthcare Finance, will focus on the many ways the industry is succeeding – and the places it's falling short – when it comes to the all-important task of enterprise-wide security.</p>
Healthcare information is being more widely shared than ever, but how can that be balanced with the need for robust privacy protections? At Health 2.0, two experts will frame the issue.
A cybersecurity expert offers a comprehensive and in-depth look into an emerging area of healthcare security, and offers tips for healthcare execs on what they can do and where they can look for answers.
The companies are combining Imprivata's Mobile Device Access technology with the Vocera Collaboration Suite, which can offer faster and more authentication across workstations, virtual desktops and mobile devices.
Data accessed during the breach may have included patient and health plan member names as well as dates of birth, Social Security numbers and some clinical information.
Leaders know that the IT department alone cannot secure an organisation, and that the easiest path to breach the best technical defenses is through their people, writes Rod Piechowski, VP of thought advisory for HIMSS.
The complexities of securing a hybrid cloud environment are not to be underestimated as more health systems contend with vendor implementations of all shapes and sizes. One prominent CISO offers tips and best practices.
An identity and access management expert illustrates this critical area of information security and offers tips on how to best control who is accessing protected health information.
Medical devices must be managed from a security perspective, but also from an operational perspective. Using analytics to establish behavior baselines helps support risk assessments, find malfunctions and enhance staff productivity.
Two healthcare CIOs and one deputy CISO offer their expert advice to their peers, explaining how to ensure security is wrapped up tight when working with public clouds.
BluePrint's visualization software coalesces security program data from disparate sources into a central "source of truth" founded on the company's workflow automation and rules engine.
An expert in the strategies and technologies surrounding identity and access management walks through today’s challenges and discusses how provider organizations can best secure this key area.
The Healthcare and Public Health Sector Coordinating Council has developed a guide to building a robust cybersecurity workforce, offering four suggestions for developing skills.
The new service from the standards development group will help healthcare clients optimize risk assessments, spot and fix compliance gaps, and manage third-party assurance needs, the standards group says.
BlueKeep? Dridex? A state of emergency in Louisiana? Healthcare security pros find themselves living in interesting times. But with new threats emerging each day – and old ones, like phishing, not going away – some tried and true lessons are still useful.
More than half of hospitals say they've had one or more data breaches caused by third-party vendors in the past two years, with an average cost of $2.9 million per incident – but too many are still failing to do adequate risk assessments.
Even as the number of organizations ready to adopt a cloud-based approach is rising, nearly a fifth of healthcare orgs surveyed said they'd consider moving their data from the cloud back on premises.
While most orgs surveyed said they have network access solutions to monitor devices connected to the network, fewer than half of small providers use network segmentation to control the spread of infections.
Even as they often rely on outmoded data management processes, 70% of execs and IT leaders say they're 'very' or 'extremely' confident of their infosec strategies.
The C-suite recognizes these threats, but 54% of respondents to a new survey said the biggest barrier to meeting privacy and security challenges was lack of adequate resources.
According to a new study by Carbon Black, two thirds of surveyed healthcare organizations said cyberattacks have become more sophisticated over the past year.
The wide array of connected devices means "lot of different stakeholders that need to coordinate," on both the clinical and IT side. That requires "process and due diligence."
You can't secure a network that you don't understand. Mapping hospital IoT is a must-do process for the creation of an effective defense strategy, experts say.