Skip to main content

Privacy & Security

By Kat Jercich | 02:12 pm | April 07, 2021
Federal officials say Trillium Health spent hundreds of thousands of dollars in response to the incident.
By Kat Jercich | 02:08 pm | April 01, 2021
Experts caution that the speed and scope of mobile COVID-19 vaccination efforts in ad hoc settings could present cybercriminals with new opportunities for data theft.
By Sara Mageit | 11:56 am | March 31, 2021
The report includes data from global healthcare organisations in the US, UK, France and Germany.
By Kat Jercich | 12:57 pm | March 30, 2021
Built on Salesforce's Vaccine Cloud, the Vaccine Edge tool is aimed at improving the vaccination signup process when high demand tests website capacity.
By Kat Jercich | 12:34 pm | March 29, 2021
The World Health Organization on Friday issued a warning about counterfeit and stolen COVID-19 vaccines being sold on the dark web.
By Bill Siwicki | 03:31 pm | March 26, 2021
The CISO at vendor FNTS goes in-depth on where cloud technology works best, and talks cybersecurity measures to address the HIPAA Safe Harbor Law.
By HIMSS TV | 07:00 am | March 25, 2021
In the debut episode of HIT Cybersecurity, Kelvin Coleman, executive director of the National Cyber Security Alliance, describes the current threat landscape – and offers tips for safeguarding a target-rich environment during the pandemic.
By HIMSS TV | 04:04 pm | March 22, 2021
Gerry Blass, CEO of ComplyAssistant, provider of an integrated approach to cybersecurity and compliance for hospitals and health systems, discusses the ramifications of the HICP law and best practices for healthcare organizations to comply.
By Kat Jercich | 05:32 pm | March 19, 2021
Atascadero State Hospital reported this week that a state employee had improperly accessed more than 2,000 records, including information necessary for tracking COVID-19.
By HIMSS TV | 08:55 am | March 18, 2021
As the attack surface continues to expand as digital transformation advances, Troy Ament, field CISO of healthcare/pharma at Fortinet, explains why it is "super critical" that security is embedded into that transformation and not just bolted on.