HEALTHCARE INFOSECURITY NEWSLETTER

February 2019

[Blog] Third-Party Assessments: What to Expect and Why They Can Benefit You

Sean Falconi, deltarisk.com, February 7, 2019

Why are third-party cyber security assessments beneficial? What’s the difference between an assessment and an audit? Find answers to these questions and more in our new blog.

Read More

Cyber Security Device Plan Seeks Alignment of Industry, Regulators

medtechdive.com, January 30, 2019

Cyber security remains at the forefront of regulatory efforts in medical technology and health IT. The Food and Drug Administration (FDA) is considering requiring device makers to submit a software bill of materials as part of premarket submissions. The agency has also hinted that more action may be coming to require companies to adopt procedures for coordinated disclosure of vulnerabilities as they are identified.

Read More

Healthcare: A Cloud Security Investigation

securityboulevard.com, January 23, 2019

More and more, modern healthcare firms are turning to cloud-based tools and enabling mobile data access from personal devices, bringing them higher productivity and employee satisfaction rates. However, organizations that allow physicians to work from unmanaged endpoints have significant data leakage concerns when they fail to equip themselves with advanced security tools capable of delivering zero-day data and threat protection in cloud and BYOD environments.

Read More

Is the Cloud Safer Than Some Health Care CIOs Think?

forbes.com, January 23, 2019

Today, as regulatory concerns are increasingly addressed for health care, CIOs can use the public cloud in several key ways to improve the care their patients receive — especially as facilities grow and scale. From backing up their system to saving confidential patient data, the cloud offers cost savings, convenience, storage and accessibility with just the click of a button.

Read More

2018 Was a Record-Breaking Year for Healthcare Data Breaches

hippajournal.com, January 28, 2019

Our 2018 healthcare data breach report reveals healthcare data breach trends, details the main causes of 2018 healthcare data breaches, the largest healthcare data breaches of the year, and 2018 healthcare data breach fines.

Read More

Health Data Breach Tally: What’s New?

healthcareinfosecurity.com, February 4, 2019

Some 22 health data breaches reported to regulators in 2019 – including hacking incidents and thefts of unencrypted devices – already have been added to the official federal tally, with business associates involved in six of the largest incidents. The Department of Health and Human Services’ HIPAA Breach Reporting Tool website shows these 22 incidents affected a total of more than 391,000 individuals, with about 60 percent of those victims affected by the six BA-related breaches.

Read More

Roper St. Francis, Valley Professionals Phishing Attacks Breach Patient Data

healthitsecurity.com, February 4, 2019

Charleston, South Carolina-based Roper St. Francis Healthcare and Valley Professionals Community Health Center (VPCHC) in Indiana recently began notifying patients that their data was potentially breached after employees fell victim to targeted phishing campaigns. The compromised information could include names, medical record numbers, health insurance details, and medical services.

Read More

The Case for Healthcare-Specific APIs

itproportal.com, February 4, 2018

In healthcare, APIs have the potential to make life easier for everyone by making information more accessible. With rising consumer expectations and the increasing use of mobile devices, a web portal as the sole point of electronic access just isn’t cutting it anymore. Of the 52 percent of patients who were offered access to medical records via a patient portal in 2017, only 28 percent took advantage of it, according to the Office of the National Coordinator for Health Information Technology.

Read More

[Webinar] How to Prepare for and Recover from an Attack in Your Hybrid Enterprise Environment

Join our experts for a live webinar on February 20 for insights on how you can plan for, detect, and respond to threats in both on-premise and cloud environments.

Register Here