In the year ahead, healthcare organizations must be prepared to face an assortment of advancing security threats, including those that damage the integrity of critical patient data, says Rod Piechowski of the Healthcare Information and Management Systems Society.
Just as it's necessary to think about security before throwing yourself into the clouds when paragliding, the same holds true for large healthcare organizations migrating data to the cloud. Whether it's your first 'flight' in the clouds or you've been gliding for a while, there are security and compliance best...
More than two dozen healthcare organizations and technology firms have formed a coalition to help address the COVID-19 crisis by using secure information sharing and data analysis. But observers warn the group must devote enough attention to privacy and security issues.
This webinar provides attendees with an overview of machine learning services and examples of outcomes from the AWS, Google and Microsoft Azure clouds. It will address challenges and opportunities in gleaning insights from large data sets. Presenters will also share what ClearDATA is doing to help organizations make...
The federal government says it will scrutinize healthcare providers and health IT vendors that participate in so-called "information blocking." But what are the top technical challenges and other barriers in ensuring that health information is being appropriately, legally and securely shared with clinicians, patients...
The digital revolution has given healthcare organizations new tools to increase team efficiency and improve their customer experience. But it's also opened up new vectors that cybercriminals can use to attack. As your attack surface expands to infrastructure that you don't own or control, becomes increasingly...
Where is the greatest potential for the implementation of blockchain in healthcare? Attorney Steven Teppler discusses the possibilities for the distributed ledger technology as well as its security pros and cons.
At its core, HIPAA compliance is simply about maintaining patient privacy by ensuring the appropriate access to and use of patient data by your users. Electronic Health Record (EHR) solutions provide detail around when patient data is accessed, but without visibility into what users do with sensitive patient data...
With the explosion of laptops, IoT, tablets, smartphones and other smart technologies, endpoints are the single largest group of devices inside your network today. Managing all of your assets and their software requires three foundational steps.
To prepare for compliance with the EU's GDPR, which will be enforced beginning in May, organizations must adopt a "privacy by design" approach, says Subhajit Deb, CISO at Dr. Reddy's Laboratories, an India headquartered pharmaceutical company that does business in 11 countries.
Healthcare technology has made leaps and bounds in terms of its ability to improve patient outcomes, and yet many technologies are being deployed before security concerns can catch up.
The latest ISMG Security Report analyzes new state bank cybersecurity regulation and getting small healthcare practitioners engaged in cyber threat information sharing. Also, why one nation claims it never experienced a cyberattack.
A report analyzing the development of a defense against attackers who exploit USB devices to hack into computers leads the latest edition of the ISMG Security Report.
Cybercriminals have become dangerously savvy at leveraging the seismic technology changes occurring in the healthcare sector in order to get their hands on sensitive patient data. Medical records are more lucrative for attackers than almost any other targeted information, leaving the healthcare industry in the...
Information security and privacy work in healthcare environments often requires a depth of specialized knowledge and competency that can be validated through the help of professional credentialing, says CISO Sean Murphy.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.