Skip to main content

Privacy & Security

By HIMSS TV | 04:04 pm | December 12, 2019
Lorraine Bessmer, senior cybersecurity analyst at St. Luke's Health System, says a lack of third-party cybersecurity standards is hampering hospital-vendor partnerships.
Innovation
By Mike Miliard | 04:59 pm | December 11, 2019
As the role of the CISO evolves, so too does the threat landscape, the infrastructure that needs safeguarding and the policy imperatives shaping the mission of data protection.
By Jeff Lagasse | 02:45 pm | December 10, 2019
While the shift is necessary, the transition period will likely see hackers targeting newly vulnerable information, said Halamka.
By Jonah Comstock | 09:00 am | December 10, 2019
Security pros are being outmaneuvered, not outsmarted, said Michael Coates at the HIMSS Healthcare Security Forum in Boston.
By Tammy Lovell | 08:22 am | December 10, 2019
 A report from charity Privacy International claims that a DHSC contract lacks transparency and prioritises commercial interest.
By Susan Morse | 05:39 pm | December 09, 2019
IT security is a legacy word, says Brian Selfridge: "This isn't cybersecurity, this is risk."
By Jeff Lagasse | 05:35 pm | December 09, 2019
Risk can have a profound impact on the financial health of any organization, where sensitive information is often hosted on outside servers.
By Mike Miliard | 04:54 pm | December 09, 2019
VPN vulnerabilities, variations of "the Blues" and PACS imaging servers are among the risks the Health Sector Cybersecurity Coordination Center, or HC3, is tracking.
SPONSORED
By HP | 02:55 pm | December 09, 2019
Coagulase-negative staphylococcus. Acinetobacter species. Escherichia coli. Klebsiella pneumoniae. Pseudomonas species. Enterococcus species. Staphylococcus aureus. These are just some of the pathogens that researchers found on 80% of mobile phones used at a tertiary care teaching hospital and on 81% of the clinicians’ hands that handled those phones.
By Bill Siwicki | 01:19 pm | December 09, 2019
A security expert offers a variety of suggestions for how to improve security training to effectively beat the threat of ransomware and other criminal mischief.