Perpetual Disruption Part 1: What is Good Cybersecurity Governance in Health Care?

Disruption means constant change. This brings benefits to businesses and can improve customer loyalty. But, the costs tend to be new and large security challenges. Which raises the question: What role does the chief information security officer (CISO) hold in this ongoing transformation? In this series, we’ll look at perpetual disruption and its impact on cybersecurity […]

The post Perpetual Disruption Part 1: What is Good Cybersecurity Governance in Health Care? appeared first on Security Intelligence.

Continue reading Perpetual Disruption Part 1: What is Good Cybersecurity Governance in Health Care?

Health Care Cybersecurity: Costly Data Breaches, Ensuring PII Security and Beyond

As hospitals get smarter, threat actors have more routes inside. IBM’s recent research on the health care industry shows how smart tools, which could be very valuable for today’s medical facilities, also need healing of their own. What should hospital IT security teams look out for? Our overview of the state of cybersecurity in the health […]

The post Health Care Cybersecurity: Costly Data Breaches, Ensuring PII Security and Beyond appeared first on Security Intelligence.

Continue reading Health Care Cybersecurity: Costly Data Breaches, Ensuring PII Security and Beyond

The Importance of Mobile Technology in State Electronic Visit Verification (EVV) Programs

Under the federal Electronic Visit Verification mandate, care providers for people with disabilities or the elderly confined to their homes will need to check in and out with a device equipped with GPS. It isn’t a security risk mandate per se, but the use of connected devices for this could add some risk.  What is Electronic […]

The post The Importance of Mobile Technology in State Electronic Visit Verification (EVV) Programs appeared first on Security Intelligence.

Continue reading The Importance of Mobile Technology in State Electronic Visit Verification (EVV) Programs

Cybersecurity for Healthcare: Addressing Medical Image Privacy

Medical imaging devices have greatly improved patient care and become a critical part of modern medical treatment. But, these devices weren’t always connected in ways they are today. Today’s tools are digital, networked with other devices and can be reached through a computer workstation. As such, more cyber threats can pose harm. So how can […]

The post Cybersecurity for Healthcare: Addressing Medical Image Privacy appeared first on Security Intelligence.

Continue reading Cybersecurity for Healthcare: Addressing Medical Image Privacy

COVID-19 Data-Sharing App Leaked Healthcare Worker Info

Philippines COVID-KAYA app allowed for unauthorized access typically protected by ‘superuser’ credentials and also may have exposed patient data. Continue reading COVID-19 Data-Sharing App Leaked Healthcare Worker Info

Supply Chain Risks in Healthcare: Time to Increase Security

The theme for National Cybersecurity Initiative‘s annual Cybersecurity Awareness Month for 2020 is Do Your Part #BeCyberSmart. For the healthcare sector, this means shedding light on the importance of securing data since the emergence of telemedicine, web-connected medical devices and third-party companies in the supply chain. These new business developments are complicating the task of […]

The post Supply Chain Risks in Healthcare: Time to Increase Security appeared first on Security Intelligence.

Continue reading Supply Chain Risks in Healthcare: Time to Increase Security

A Recipe for Reducing Medical Device Internet of Things Risk

You may recall this blog post from March 2020. It highlighted the importance of factoring in clinical, organizational, financial and regulatory impact when determining which medical Internet-of-Things (IoMT) security vulnerabilities should be fixed first. Consider this post a part two. Whereas the previous post focused on the fact that IoMT devices are here to stay […]

The post A Recipe for Reducing Medical Device Internet of Things Risk appeared first on Security Intelligence.

Continue reading A Recipe for Reducing Medical Device Internet of Things Risk

DDoS Attacks Increase in Size, Frequency and Duration

Distributed denial of service (DDoS) attacks are increasing in size, frequency and duration. Kaspersky Lab reported a doubling of DDoS attacks in the first quarter of 2020 compared with the fourth quarter of 2019, plus an 80% jump compared with the same quarter last year. Kaspersky also found that DDoS cyberattacks are increasing in duration. […]

The post DDoS Attacks Increase in Size, Frequency and Duration appeared first on Security Intelligence.

Continue reading DDoS Attacks Increase in Size, Frequency and Duration

Protecting Healthcare Data and Infrastructure

The healthcare industry is increasingly targeted by cybercriminals. As digital transformation accelerates and more providers move their internal systems to the cloud, deploy IoT medical devices and host medical records online, they become even more vu… Continue reading Protecting Healthcare Data and Infrastructure