Privacy & Security
Cloud Computing
Four analysts from Black Book, Chilmark, KLAS and PwC offer their expert advice for healthcare CIOs and other IT leaders seeking to make cloud technology work for their organizations.
SPONSORED
Healthcare organizations have been fighting the good fight against cybercrime for many years. But they still need to up their game. As such, they need to take the following steps as they more proactively deal with cybersecurity threats.
SPONSORED
The good news for healthcare organizations is that with telehealth solutions, it is much easier to bring professionals and patients together to collaborate, as they no longer need to be in the same physical location.
Troy Young, chief technology officer at AdvancedMD and a cybersecurity expert, offers IT and infosec professionals some useful advice to help manage the potential of HIPAA audits.
SPONSORED
Confront cyberthreats to healthcare reliably and affordably: Leverage a security operations center-…
A security operations center (SOC) provides a focal point for security operations, but providing 24x7 SOC coverage is beyond the means of most organizations due to people and technology costs.
It's been an eventful year for health IT, with many health systems investing in AI and machine learning, exploring advanced pop health analytics, deploying leading-edge cybersecurity tools, expanding telehealth programs of all shapes and sizes, and embrac
Ransomware attack had a “strong impact” on operations over the weekend.
Virtual Care Provider Inc., which provides hosting and IT services to post-acute care facilities nationwide, was hit by the Ryuk variant, locking access to patient data at 110 nursing homes.
Developing tools to separate and automatically control Internet of Things traffic is one important way to safeguard medical device security.
Erik Decker, chief security and privacy officer at University of Chicago Medicine, describes the value of HHS' Health Industry Cybersecurity Practices framework, which offers workable best practices for the management and mitigation of prevalent threats.