Skip to content Skip to navigation

Disaster Recovery/Business Continuity

A New Study Looks at the Hidden Threats Within Network Traffic

August 30, 2016  |  Mark Hagland
article
The Ponemon Institute and A10 Networks have released a new survey-based study that looks at a range of network traffic-related threats to data security in healthcare and other industries

At iHT2-Seattle, One CISO Offers a Comprehensive View of the Current IT Security Risk Environment

August 16, 2016  |  Mark Hagland
article
In the opening keynote presentation at iHT2-Seattle, Cris V. Ewell, Ph.D., CISO at UW Medicine in Seattle, shared his perspectives on the challenges of gearing up to develop truly comprehensive IT security strategies—and executing on those strategies

FBI Agent to CHIME Attendees: The Cybersecurity Environment Is Becoming More Dangerous

August 15, 2016  |  Mark Hagland
article
FBI Supervisory Special Agent Timothy J. Wallach shared with attendees of the CHIME/AEHIS LEAD Forum Event in Seattle some of the latest trends in cybercriminality that are affecting or about to affect U.S. healthcare organizations

Health IT Security Nuances and Complexities the Focus of First Panel Discussion at iHT2-Nashville

August 11, 2016  |  Mark Hagland
article
In a wide-ranging conversation, participants in the first panel discussion of the day at the Health IT Summit in Nashville looked at the broad array of challenges and opportunities facing healthcare IT leaders around data security in the present moment

Health IT Security Luminary Mac McMillan Offers Views on Accelerating Data Dangers

August 11, 2016  |  Mark Hagland
article
Mac McMillan, CEO of the CynergisTek consulting firm, told CHIME/AEHIS LEAD Forum Attendees on Wednesday that the threats to healthcare IT security are now accelerating at an alarming pace

FBI Agent to CHIME/AEHIS LEAD Forum: Healthcare Leaders Still Not Up to Speed on Basic IT Security Tasks

August 10, 2016  |  Mark Hagland
article
FBI Supervisory Special Agent Scott Augenbaum told CHIME/AEHIS LEAD Forum attendees in Nashville on Monday that the leaders of healthcare organizations need to move forward now to implement comprehensive IT security strategies

Are Data Security Measures Getting in the Way of Efficient Workflow? Healthcare Providers in the Trenches Share their Stories

August 9, 2016  |  Heather Landi
blog
While high-level discussions about data security strategies are important at every healthcare delivery organization, it’s critical to keep in mind how security measures are impacting the physicians who work in the trenches every day to provide patient care.

California to Pilot POLST Registry

August 7, 2016  |  David Raths
news
With financial support from the California Health Care Foundation, two communities in the state will pilot a cloud-based electronic registry for Physician Orders for Life-Sustaining Treatment (POLST).

Ransomware Now Most Profitable Malware Type, Weaker Security Makes Healthcare a Target, Research Says

July 27, 2016  |  Heather Landi
news
Cisco recently released its 2016 Midyear Cybersecurity Report and, according to its latest threat intelligence and trend analyses, while ransomware is not a new threat, it has evolved to become “the most profitable malware type in history.”

OIG Study Finds 60 Percent of Hospitals Experienced EHR Disruptions, Highlights Importance of Contingency Plans

July 25, 2016  |  Heather Landi
news
Close to 60 percent of hospitals have experienced an unplanned disruption to their EHR systems and a quarter of those hospitals experienced delays in patient care as a result, according to a study released by the HHS Office of Inspector General (OIG).

At iHT2-Denver, CISOs Offer Stimulating Insights into the Top IT Security Priorities Being Pursued by Industry Leaders

July 13, 2016  |  Mark Hagland
blog
At the Health IT Summit in Denver, Fernando Blanco-Dopazo, CISO at CHRISTUS Health, and Howard Haile, CISO at SCL Health, shared insights and perspectives on some of the most challenging issues facing CISOs today

HHS OCR Issues Guidance on Ransomware Attacks and HIPAA Breaches

July 12, 2016  |  Heather Landi
news
Is a ransomware attack on a healthcare organization’s computer system a breach under the HIPAA Privacy Rule? If the electronic protected health information (ePHI) has been encrypted as a result of ransomware, then yes, according to newly released guidance from...

Pages

Subscribe to Disaster Recovery/Business Continuity