Skip to main content

Privacy & Security

By Bernie Monegain | 11:59 am | July 25, 2016
The Office for Civil Rights said that UMMC was aware of security risks as far back as April 2005 but did not take appropriate action.
By Jack McCarthy | 10:40 am | July 25, 2016
The U.S. Bureau of Labor Statistics estimated that data breaches and hacking attacks will expand the information security professional workforce by nearly 20 percent. 
By Tom Sullivan | 02:01 am | July 25, 2016
The Office of the Inspector General posted research from 2014 so there’s reason to believe the proliferation of cyberattacks and malware could create even more downtime. OIG recommended that hospitals institute and continuously update contingency plans.
By Jeff Lagasse | 05:01 pm | July 22, 2016
Philip Esformes, Odette Barcha, and Arnaldo Carmouze were charged with conspiracy, fraud and money laundering in a wide-ranging billing scam. 
By Jack McCarthy | 11:57 am | July 21, 2016
Researchers propose tactics for preventing ransomware attacks and learning from them when they do occur, based on NIST’s cybersecurity framework. 
By Bill Siwicki | 08:17 am | July 20, 2016
William Yasnoff, MD, has developed a personal grid format that can prevent hackers from accessing an entire database full of patient records. Hospitals or IT vendors can use the tactic – for free – to force cybercriminals to decrypt one record at a time.
By Bill Siwicki | 08:11 am | July 20, 2016
Health and Human Services said in a new report to Congress that current regulations are not keeping pace with consumer engagement tools, including fitness trackers, social media, mobile health apps and wearables.
By Bill Siwicki | 07:58 am | July 20, 2016
Google’s artificial intelligence technology is working on health issues but its reliance on large troves of health data has some CISOs, physicians and patients concerned.
By Bernie Monegain | 11:16 am | July 19, 2016
Officials from Oregon Health and Science University said that one of the incidents was because of a stolen laptop, while the other involved a cloud storage service business associate. 
SPONSORED
By Innovation Center | 09:10 am | July 19, 2016
Hacking and other types of computer intrusions are increasingly sophisticated. Jump into this Healthcare Perspectives to learn why a cybersecurity solution must leverage people, processes and technology.