Privacy & Security
Privacy & Security
Even with fortified defenses, attackers only need an opening while the defender must be constantly on-guard; just one mistake opens the point of entry.
Compliance
While gap analysis can find existing vulnerabilities in an organization’s security, it’s not an equal substitution for HIPAA-required risk analysis.
Privacy & Security
The latest HIMSS cross-sector threat report outlines the growing strength of cryptomining software to line the pockets of hackers, and the need for healthcare organizations to be more proactive.
Electronic Health Records
Big opportunities, and challenges, ahead for the distributed ledger, from EHRs to supply chain and security.
Interoperability
Organizations said they will advance testing of a secure digital ID proof-of-concept program that is designed to reach millions of consumers, while Trusted Key also announced a $3 million round of funding.
Privacy & Security
Start by looking for unusual network activity, practicing situational awareness and using old school methods to combat phishing.
Privacy & Security
Discovered in October, the fundamental WP2 protocol vulnerability can cause a complete loss of control of data and let a hacker launch a man-in-the-middle attack.
IT Infrastructure
The planned update is just the latest move to improve the National Health Services since WannaCry.
IT Infrastructure
Hackers hit the IT vendor of three Center for Orthopaedic Specialists locations in February, which locked out users and encrypted patient data.
IT Infrastructure
MEDantex left a portion of its customer portal open to the public after it rebuilt its site due to a ransomware attack.