If a business has $1.5 million available, it’s a safe bet it would rather not spend that money paying to settle violations of the Health Insurance Portability and Accountability Act … Continue reading
Everyone knows who to blame for a data breach – the bad guys. But what happens when one of the good guys makes a mistake? Unfortunately, the impact can be just as severe.
Check out two major threats to cyber security in healthcare: software flaws and misconfigurations. See how a coding flaw from a vendor of a fat-finger from your coworker can lead to your next HIPAA breach.Continue reading
Email is an old channel, but it remains one of the most popular for cyber attacks. This is true in many industries, and especially in healthcare.
See why email remains the top location of HIPAA data breaches, and see other types of breaches that – while fewer in number – cause far more harm.Continue reading
Do you have the right priorities in healthcare cyber security?
You might be surprised to learn that data breaches in healthcare are often different than in other industries. They’re more often caused by insiders, not by malware.
Check out the highlights of a new report from Verizon on the top causes of data breaches in healthcare. You’ll see the top causes reported from 2015 to 2017.Continue reading
If you saw only the headlines, you might think healthcare had a terrible year in cyber security – maybe worse than ever. But a new report shows, in many ways, the industry gained ground last year.
See highlights of the newest stats on data breaches in healthcare. See where more work is needed and get a few talking points to share with your clients.Continue reading
Healthcare IT and HIPAA compliance had a big year in 2017. Now you can catch up on the biggest stories with this post.
See the top stories in healthcare IT security for the year. We cover ransomware attacks, record-breaking HIPAA fines, and more.Continue reading
Web applications are booming in healthcare – unfortunately, their security standards need a checkup and may require surgery.
See the top five types of web application attacks in healthcare during Q2 2017. You’ll get an overview of the types and how they compare to other target industries.Continue reading
Medical devices have terrible security just like everything else in the Internet of Things. But while a hacked thermostat is annoying, a hacked insulin pump can kill you.
See the top three fears of health IT pros around medical device security. You’ll get examples of potentially fatal hacks and malware that can ensnares the entire network.Continue reading