Cybersecurity

Organizations See 878% Health Data Growth Rate Since 2016

by Fred Donovan

Healthcare organizations have seen an explosive health data growth rate of 878 percent since 2016, reaching 8.41 petabytes (PB) on average in 2018, according statistics compiled by Dell EMC. The scale...

One-Quarter of Medical Devices Still Running Outdated Windows 7

by Fred Donovan

More than a quarter of medical devices are running Windows 7, which will no longer be supported by Microsoft after January 14 of next year, according to a survey of 600 global healthcare IT...

Organizations Are More Comfortable Putting PHI in Healthcare Cloud

by Fred Donovan

Healthcare organizations are becoming more comfortable putting sensitive PHI in the cloud, observed Mike Jude, digital health research manager at Frost & Sullivan. “For many cloud service...

HHS IT Security Program “Not Effective,” Says OIG FISMA Audit

by Fred Donovan

HHS OIG has determined that the department’s IT security program was “not effective” because it did not meet security levels required by the Federal Information Security Modernization...

Network, Cloud Monitoring Is Healthcare Cybersecurity Challenge

by Fred Donovan

Monitoring of networks, endpoints, and cloud assets is a continuing cybersecurity challenge for many healthcare organizations, according to CynergisTek’s 2019 annual report. This is bad news...

AHA: Medical Device Makers Falling Short on Securing Legacy Devices

by Fred Donovan

Medical device manufacturers are not doing enough to secure legacy devices, argued the American Hospital Association (AHA) in a recent letter to Sen. Mark Warner (D-VA). AHA observed that hospitals...

Healthcare’s Strong Network Security May Reflect Outdated Model

by Fred Donovan

The healthcare industry ranks fifth for network security when compared to other major U.S industries, according to 2019 Healthcare Cybersecurity Report by SecurityScorecard. This was the strongest...

HHS Comes Up Short in Web Application, Network Security, says OIG

by Fred Donovan

Eight HHS operating divisions were tested for web application and network security and found wanting, according to a recently released OIG report. The HHS divisions came up short in configuration...

HL7 Standards Could Open Health IT Infrastructure to Cyberattacks

by Fred Donovan

The HL7 standards, key for healthcare interoperability, could open up healthcare infrastructure to cyberattacks, warned researchers at the University of California (UC) system. The HL7 standards...

NSF Grants $1M to Develop Secure Health IT Infrastructure

by Fred Donovan

The National Science Foundation (NSF) has awarded a three-year, nearly $1 million grant to University of Massachusetts and Elizabethtown College researchers to develop a secure health IT infrastructure...

Hospitals Are at High Risk of Cyberattacks, Warns Moody’s

by Fred Donovan

Hospitals are at high risk for cyberattacks, judged Moody’s Investors Service in a new report.  Other sectors that are at high risk for cyberattacks include banks, securities firms, and...

Upgrading Health IT Infrastructure Top Challenge for Healthcare

by Fred Donovan

Upgrading health IT infrastructure was cited as among the top challenges facing healthcare executives in 2019. On behalf of SAP, Porter Research polled 100 healthcare CEOs, CFOs, and CIOs from...

Cynerio Gets $7M for Healthcare Internet of Things Security Product

by Fred Donovan

Cynerio, a startup providing cybersecurity for healthcare Internet of Things devices, has received an infusion of $7 million in its latest funding round. Investors in the most recent round are...

Greater Medical Device Connectivity Prompts FDA Process Revision

by Fred Donovan

The FDA is updating its voluntary 510(k) approval process to take into account growing medical device connectivity and interoperability, the agency announced Nov. 26. The FDA explained that the...

Healthcare Infrastructure Security Frameworks Support Innovation

by Elizabeth O'Dowd

Healthcare infrastructure security framework are growing in importance as organizations trust PHI to digital tools. As more information is stored digitally, cyberattacks are more common and are...

Cloud-Based Identity and Access Management Increases Flexibility

by Elizabeth O'Dowd

Organizations are leaning towards healthcare identity and access management (IAM) solutions as they continue to add cloud-based services and mobile devices to their IT infrastructure. Research and...

Legacy Hardware Threatens HIT Infrastructure Security

by Elizabeth O'Dowd

Healthcare organizations are facing a “perfect storm” when it comes to HIT infrastructure security, ERI Co-Founder and Executive Chairman John Shegerian said in a report. The growth in...

Increasing Healthcare Cloud Security with Bring-Your-Own-Key

by Elizabeth O'Dowd

Organizations are constantly looking for ways to gain more control over healthcare cloud security. Putting PHI into the hands of cloud service providers (CSPs) involves a high level of trust. CSPs...

Healthcare Cloud Security Relies on Infrastructure Visibility

by Elizabeth O'Dowd

Organizations have gone through different periods of trust with the healthcare cloud as the technology becomes a staple in health IT infrastructure. Providers were initially hesitant with cloud...

Compliance Testing Remedies HIT Infrastructure Vulnerabilities

by Elizabeth O'Dowd

Organizations expanding their IT environment are tasked with choosing tools that are in compliance with HIPAA and can be used securely and efficiently in a healthcare environment. HIT infrastructure...