Skip to main content

Privacy & Security

By Kat Jercich | 02:38 pm | February 16, 2022
Plus: Ukrainian banks and military agency hit with DDoS attack, and an EHR vendor agrees to pony up $1.3 million after a data breach.
By Kat Jercich | 10:46 am | February 16, 2022
Mercy Hospital Oklahoma City filed a motion for a temporary restraining order after COVID-19-related social media posts accused providers of murder.
SPONSORED
By Microsoft | Microsoft | 09:52 am | February 16, 2022
In an ever-changing landscape of cyberthreats, here are some ways CISOs can bring teams together and establish a culture of security.
08:29 am | February 14, 2022
The EU announced that it's preparing to extend the Digital COVID Certificate by a year, until June 2023. On 31 March, it will publish a report on the technology’s regulation, and Brussels-based Frieda Klotz finds out more.
By Kat Jercich | 05:40 pm | February 10, 2022
Before the COVID-19 pandemic began to ripple across the world, Harvard Medical Faculty Physicians at Beth Israel Deaconess Medical Center had only used telehealth in a limited capacity.
By Kat Jercich | 12:27 pm | February 10, 2022
Teladoc Health, IBM, Epic and athenahealth all signed on to support the proposed legislation.
By Nathan Eddy | 01:44 pm | February 07, 2022
Implementing a framework can be useful, but it requires resources – and healthcare organizations may face challenges gaining consensus over which ones to deploy, said a compliance expert ahead of HIMSS22.
By Kat Jercich | 05:09 pm | February 04, 2022
The incident, which took place in August, exposed the information of about 22,000 individuals.
By Bill Siwicki | 01:34 pm | February 03, 2022
A healthcare cybersecurity expert discusses how IT buyers can put financial pressure on device manufacturers to help drive a higher level of security for their fleets.
By Mike Miliard | 10:41 am | February 03, 2022
As risk levels increase, health systems have "significant challenges to overcome," according to the 13th annual report – including suboptimal security spending, vulnerable legacy tech and weak-link human factors.