Incident Response for Health Care IT: Differences and Drivers

Threat actors continue to target the health care industry. IBM’s Threat Intelligence Index for 2022 rates the industry as the sixth most targeted. That puts it close behind the energy and retail and wholesale sectors. Certain regions seem to be more prone to attack as well. The Asia-Pacific region accounted for 39% of all health […]

The post Incident Response for Health Care IT: Differences and Drivers appeared first on Security Intelligence.

Continue reading Incident Response for Health Care IT: Differences and Drivers

High Stakes, Rising Risks: The Ripple Effects of Cybersecurity in the Healthcare Sector

Is providing effective cybersecurity for the healthcare sector an IT problem or a wider-scope issue? The short answer is that it’s both.

The post High Stakes, Rising Risks: The Ripple Effects of Cybersecurity in the Healthcare Sector appeared first on Security Intelligence.

Continue reading High Stakes, Rising Risks: The Ripple Effects of Cybersecurity in the Healthcare Sector

FBI Warns EdTech Needs Stronger Defenses for Students’ Personal Data

EdTech today stores more personally identifiable information on K-12 students than ever, but the FBI warns that much of that data is severely exposed to threat actors.

The post FBI Warns EdTech Needs Stronger Defenses for Students’ Personal Data appeared first on Security Intelligence.

Continue reading FBI Warns EdTech Needs Stronger Defenses for Students’ Personal Data

Data Privacy Must Evolve Beyond Confidentiality

Most security systems are built with data confidentiality in mind, but effective data privacy will also emphasize integrity and availability.

The post Data Privacy Must Evolve Beyond Confidentiality appeared first on Security Intelligence.

Continue reading Data Privacy Must Evolve Beyond Confidentiality

Data Activity Monitoring Gives Health Care Organizations X-Ray Vision Into Medical Imaging Security Risks

Poor medical imaging security can have potentially life-threatening consequences such as delayed treatment, inaccurate diagnosis and prescription fraud.

The post Data Activity Monitoring Gives Health Care Organizations X-Ray Vision Into Medical Imaging Security Risks appeared first on Security Intelligence.

Continue reading Data Activity Monitoring Gives Health Care Organizations X-Ray Vision Into Medical Imaging Security Risks

HIPAA Settlements of 2016: Lessons Learned

The HIPAA settlements from 2016 reinforce the importance of risk analysis when creating policies and procedures to protect PHI.

The post HIPAA Settlements of 2016: Lessons Learned appeared first on Security Intelligence.

Continue reading HIPAA Settlements of 2016: Lessons Learned

HIPAA, Fines and Your Business Associate Agreement

Health care companies must review every business associate agreement to ensure that it aligns with HIPAA requirements and that PHI is properly secured.

The post HIPAA, Fines and Your Business Associate Agreement appeared first on Security Intelligence.

Continue reading HIPAA, Fines and Your Business Associate Agreement

Breaking Borders: Is HIPAA History in a Post-EHR World?

The rash of cyberattacks on health care organizations has highlighted the need for the industry to move beyond HIPAA to develop stronger security strategies.

The post Breaking Borders: Is HIPAA History in a Post-EHR World? appeared first on Security Intelligence.

Continue reading Breaking Borders: Is HIPAA History in a Post-EHR World?