Experience this captivating interview featuring David Bradley, Vice President of Consulting Services at Clearwater Security, as he provides in-depth analysis on the current state of generative AI trends in the healthcare industry.
Shadow IT strikes again: Britain's privacy watchdog has reprimanded the NHS Lanarkshire health board in Scotland after finding its staff used WhatsApp for the unauthorized sharing of patient data and images as a workaround for in-person clinical discussions during the coronavirus pandemic.
Healthcare IT and security professionals have spoken. Ponemon listened. In this study sponsored by Proofpoint, Ponemon surveyed 641 people responsible for security strategies – including setting IT cybersecurity priorities, managing budgets and selecting vendors and contractors. The goal was to understand the...
Cyber criminals have long viewed healthcare as an attractive target. But in today's uncertain environment, cyber threats are more potentially damaging than ever. Ransomware attacks show no sign of stopping – simply because they work. Download IDC's Industry Spotlight to learn more about how healthcare organizations...
A U.S. senator is suggesting adding cybersecurity standards to the list of federal prerequisites for medical practice participation in Medicare. Cybersecurity is a patient safety issue, says Mark Warner (D-Va.). He today released a slew of proposals for augmenting healthcare cybersecurity.
Healthcare organizations cannot adequately protect the safety and privacy of their patients and staff unless they have efficient, accurate systems to manage third-party identity risk.
By managing third-party risk at the identity level, healthcare organizations can make better-informed access decisions. Adopting a...
In 2020, reports indicated that cyberattacks on the healthcare industry more than doubled from 2019, with
ransomware accounting for 28 percent of all attacks. Unlike previous attacks focused
primarily on providers, the COVID-19 pandemic
exposed vulnerabilities in the entire healthcare sector.
Attackers, especially...
With no federal privacy law in place, individual states in the US are working to create their own privacy laws to protect their residents. California’s law is already in place, and Virginia just recently passed one of its own. Colorado has a law on the table for voting, while other states are trying repeatedly to...
Good news in the fight to prevent COVID-19 infections: Researchers report that a digital contact-tracing app rolled out in England and Wales that's designed to keep users' data private and secure is helping to blunt the spread of the pandemic. They urge continuing global uptake of such apps.
Within the last few years, digital transformation and Cloud services have increased the
complexity of IT infrastructure, making you reliant on multiple third
parties to keep your data safe. The threat landscape has also increased in breadth and depth with more
attacks, more kinds of attacks and more targeted...
Cybersecurity professionals operate in a dynamic environment driven by two accelerating forces; threat developments and the rapid adoption of new technologies. And yet most companies still rely on discrete snapshots of their security performance.
Healthcare organizations must cope with both forces - they have...
The healthcare supply chain is a vast web of complex hardware, software, processes and paperwork. Yet few industries hold the level of personal, and even physical, risk should compromises occur via a cyber attack. The problem is almost too big for organizations to get full visibility into using traditional means -- so...
Ransomware attacks remain the top cyber-enabled threat seen by law enforcement. But phishing, business email compromises and other types of fraud - many now using a COVID-19 theme - also loom large, Europol warns in its latest Internet Organized Crime Threat Assessment.
How many different shades of bizarre is the data breach notification issued by software vendor Blackbaud? Over the course of three paragraphs, Blackbaud normalizes hacking, congratulates its amazing cybersecurity team, and says it cares so much for its customers that it paid a ransom to attackers.
Digitally and physically transforming the security experience for patients and visitors is a critical part of the total patient care equation.
In spite of this, many organizations continue to handle their physical identity and access management through manual processes with data housed in disparate physical...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing gdpr.inforisktoday.com, you agree to our use of cookies.