Skip to main content

Privacy & Security

By Bill Siwicki | 03:10 pm | June 04, 2019
Cybersecurity experts from across health IT offer their opinions on the breach itself, what must be done for the lab company to fix security and regain trust – and how similar incidents can be avoided across healthcare.
By Mike Miliard | 05:02 pm | June 03, 2019
The unauthorized access also included Social Security numbers, credit card data and banking information – but not laboratory results, the company said.
Innovation
By Mike Miliard | 04:30 pm | June 03, 2019
The retailer joins other big players such as AmerisourceBergen, McKesson and Pfizer in the effort to use distributed ledger technology for medication safety and integrity.
By Nathan Eddy | 01:27 pm | June 03, 2019
The Department of Justice charged Coffey Health System with failing to conduct the risk analyses required by the Medicare and Medicaid EHR Incentive Programs.
By Mike Miliard | 04:37 pm | May 31, 2019
The Medical Group Management Association also has concerns about security risks that might be associated with the proposed rules, and says they go "too far, too fast."
By Benjamin Harris | 11:56 am | May 30, 2019
The wide array of connected devices means "lot of different stakeholders that need to coordinate," on both the clinical and IT side. That requires "process and due diligence."
By Nathan Eddy | 10:32 am | May 30, 2019
Research from Digital Shadows found imaging files particularly vulnerable.
By Nathan Eddy | 01:00 am | May 30, 2019
The Auditor-General determined that deficiencies exist in the region’s public health digital record systems that make them “highly vulnerable.”  
By Benjamin Harris | 01:19 pm | May 29, 2019
You can't secure a network that you don't understand. Mapping hospital IoT is a must-do process for the creation of an effective defense strategy, experts say.
SPONSORED
By CyberArk | CyberArk | 10:58 am | May 29, 2019
The risk is that with so many access points, there is the high potential for exfiltration of data, especially those consciously or unconsciously occurring because of vulnerabilities with privileged escalation— which is administrative-level access to all kinds of vital data about patients and the organization.