Skip to main content

Privacy & Security

Cybersecurity
By Leontina Postelnicu | 12:13 pm | October 08, 2018
As compliance continues to be a point of concern, we take a look at the implications of GDPR for UK health and care.
Analytics
By Tom Leary | 09:41 am | October 08, 2018
Tom Leary highlights milestones made during the annual event and looks at this year’s NHITWeek points of engagement.
Analytics
By Tom Sullivan | 08:30 am | October 08, 2018
NHITWeek 2018 moves beyond proving the value of HIT to focus on showing successes of using information and technology.
IT Infrastructure
By Jessica Davis | 05:22 pm | October 05, 2018
The healthcare sector is well-aware that medical devices are vulnerable, but it’s hard to obtain the extra resources to fix the issue.
Privacy & Security
By Mike Miliard | 11:24 am | October 05, 2018
A new CHIME-KLAS survey of CIOs, CISOs and other security leaders finds that few are confident in their ability to protect patient safety and prevent disruptions from cybercriminals.
Cybersecurity
By Dan Costantino | 10:42 am | October 04, 2018
Penn Medicine CISO Dan Costantino outlines the steps to gathering information so you can plan strategically and educate the business about threats.
Interoperability
By Tom Sullivan | 01:48 pm | October 03, 2018
More than 70 percent of respondents ranked biometrics, such as fingerprinting and facial recognition, as the top choice for a unique identifier while hospital executives raised some questions.
Security
By Jessica Davis | 09:00 am | October 03, 2018
Simulated attacks on a healthcare organization can help infosec leaders assess their security posture, but not all pen testers are created equal and not every provider is ready to be tested.
IT Infrastructure
By Mike Miliard | 09:00 am | October 03, 2018
The prospect of hackers gaining access to remote access to networked IT systems and connected medical devices raises concerns about serious safety risks.
Cybersecurity
By Jessica Davis | 09:00 am | October 02, 2018
Part one of our cyber insurance series focuses on cyber policies and how organizations need to do their homework to ensure they’re covered after a breach.