Insider Report: Healthcare Security Woes Balloon in COVID-Era

As hackers put a bullseye on healthcare, Threatpost spotlights how hospitals, researchers and patients have been affected and how the sector is bolstering their cyber defenses. Continue reading Insider Report: Healthcare Security Woes Balloon in COVID-Era

Medical Information of 233,000 Individuals Exposed after Genetic Testing Lab Hack

As the tab for security incidents in 2020 remains open, cybercriminals are diligently looking for new ways to attack and capitalize on valuable healthcare information. More than 143 security incidents have been added to the Health Insurance Portability… Continue reading Medical Information of 233,000 Individuals Exposed after Genetic Testing Lab Hack

Data Breach: A summary of healthcare security incidents in March 2020. Are you a victim of Medical Identity Theft?

A quick overview of data breaches from the healthcare industry in March 2020 reveals 26 security incidents added to the Health Insurance Portability and Accountability Act (HIPAA) Breach Reporting Tool. The HIPPA Breach notification Rule“requires… Continue reading Data Breach: A summary of healthcare security incidents in March 2020. Are you a victim of Medical Identity Theft?

Collaboration Under PDGM

The new year means the roll out of Patient-Driven Groupings Model (PDGM). It’s the biggest change in Medicare’s payment methodology for home healthcare since the home health Prospective Payment System (PPS) was implemented and, like PPS, me… Continue reading Collaboration Under PDGM

Physician, protect thyself: An ounce of prevention is worth a pound of cure

In this final installment of “Physician, protect thyself,” we take a look at two key roles in small- to medium-sized hospitals and outpatient clinics that must step up their cybersecurity game to protect patients and staff alike.
Categories:

101… Continue reading Physician, protect thyself: An ounce of prevention is worth a pound of cure

The Value of a Hacked Company

Most organizations only grow in security maturity the hard way — that is, from the intense learning that takes place in the wake of a costly data breach. That may be because so few company leaders really grasp the centrality of computer and network security to the organization’s overall goals and productivity, and fewer still have taken an honest inventory of what may be at stake in the event that these assets are compromised. Continue reading The Value of a Hacked Company

The Value of a Hacked Company

Most organizations only grow in security maturity the hard way — that is, from the intense learning that takes place in the wake of a costly data breach. That may be because so few company leaders really grasp the centrality of computer and network security to the organization’s overall goals and productivity, and fewer still have taken an honest inventory of what may be at stake in the event that these assets are compromised. Continue reading The Value of a Hacked Company