Skip to main content

Privacy & Security

By Andrea Fox | 05:50 pm | August 23, 2022
The hospital system fell victim to ransomware planted by the Karakurt data extortion group, beginning in late May.
By Andrea Fox | 04:58 pm | August 19, 2022
The bureau was able to work with the health center to isolate a server infected with malware and prevent any compromise to patient data.
By Andrea Fox | 12:07 pm | August 16, 2022
The cybersecurity breach at the RCM outsourcing vendor involved a cloud-hosted email account and reportedly exposed patient information for 2,787 individuals.
By Mike Miliard | 11:51 am | August 16, 2022
The Joint Cybersecurity Advisory about the ransomware-as-a-service variant comes as Capitol Hill leaders are asking HHS to boost its efforts to protect hospitals and public health systems from cyberattacks.
By Michael Marshall | 02:45 pm | August 12, 2022
NGITS are versatile, adaptable infrastructures and engineering/operations that can incorporate new mission-advancing technologies and business processes into the enterprise as they emerge in a thoughtful, integrated way.
By Andrea Fox | 11:39 am | August 09, 2022
More than half of respondents to a new survey say their healthcare organizations experienced one or more cyberattacks in the past 24 months involving connected medical devices.
By Emily Olsen | 04:52 pm | August 02, 2022
A report by the U.K.-based Organisation for the Review of Care and Health Apps found 84% of 25 apps shared data outside of the developer's system.
By Mike Miliard | 12:02 pm | August 02, 2022
He's concerned that the acquisition would "provide Amazon with access to enormous tranches of patient data."
By Nathan Eddy | 11:31 am | July 28, 2022
The companies are shaping their future plans for cybersecurity risk management, patient safety data and other health IT use cases.
By Nathan Eddy | 10:57 am | July 27, 2022
The newest IBM X-Force Cost of a Data Breach Report also shows healthcare organizations have the longest breach cycle of any industry, requiring nearly 11 months to identify and contain security incidents.