HITInfrastructure

Healthcare Network Security

WPA2 Vulnerability Threatens Healthcare Network Security

October 17, 2017 - CERT Coordination Center (CERT/CC) released an announcement warning organizations about a wide-spread WPA2 protocol vulnerability. This vulnerability can access devices and WiFi access points (APs) to steal data or infect a protected network, potentially threatening healthcare network security as well. Healthcare organizations need to advise their employees against connecting to any AP, especially...


More Articles

Dell EMC Helps HIT Infrastructure Handle Digital Transformation

by Elizabeth O'Dowd

Dell EMC announced the expansion of its Open Networking initiative with new HIT infrastructure solutions and services to help organizations manage increasing network demands as they continue their digital transformations. The majority of enterprise...

Healthcare Industry Now a Leading Target for Cyberattacks

by Elizabeth O'Dowd

Healthcare surpassed the public sector this year in reporting the greatest number of security incidents in Q2, according to a new study released by McAfee. The healthcare industry accounted for 26 percent of cyberattacks over between April and...

Cloud Adoption Hindered by Legacy Network Architecture

by Elizabeth O'Dowd

Healthcare organizations are in the midst of a digital transformation as legacy systems are replaced with new cloud-based infrastructure. However, the transition is not smooth and many organizations are facing issues stemming from legacy network...

Successful Network Management Requires Visibility, Automation

by Elizabeth O'Dowd

Healthcare organizations are introducing more devices and solutions into their health IT infrastructure architecture, which makes network management, visibility, and automation more important than ever. Extreme Networks announced the release...

Lack of Design Phase Involvement Threatens Medical IoT Security

by Elizabeth O'Dowd

A recent Deloitte poll identified that legacy and fielded medical Internet of Things (IoT) devices challenge provider connected device ecosystems, indicating that medical IoT security continues to test healthcare organizations. Thirty-six percent...

HIMSS Finds Improved HIT Network Security Infrastructure

by Elizabeth O'Dowd

Organizations need to enhance their HIT network security infrastructure as more advanced cyberattacks continue to threaten clinical data. HIMSS released its latest cybersecurity survey, which highlights the importance of cybersecurity to health...

Hyper-Converged Infrastructure Rising in HIT Infrastructure

by Elizabeth O'Dowd

Hyper-converged infrastructure systems are emerging in HIT infrastructure as organizations seek a way to consolidate IT systems to be faster and more manageable. The global hyper-converged integrated system market is expected to grow at a 37...

Utilizing SIEM to Support Real-Time Cybersecurity Monitoring

by Elizabeth O'Dowd

Organizations digitizing their health IT infrastructures are vulnerable to different cybersecurity threats. Network cybersecurity monitoring solutions, such as security information and event management (SIEM) solutions, can provide much needed...

Asset Tracking Significant to IoMT Availability, Security

by Elizabeth O'Dowd

As healthcare organizations continue to adopt Internet of Medical Things (IoMT) devices, their many uses become more apparent. Connecting medical devices to the network not only allows them to transmit clinical data, but it also gives organizations...

How SD-WAN Simplifies Healthcare Network Infrastructure

by Elizabeth O'Dowd

Software-defined wide area networks (SD-WAN) are growing in healthcare because of their potential for centralized management and better software, simplifying healthcare network infrastructure. The technology’s potential has inspired vendors...

How Red Hat’s Linux Update Affects HIT Infrastructure, Security

by Elizabeth O'Dowd

Red Hat announced the availability of its latest version of its Linux platform, Red Hat Enterprise Linux 7.4. The updated platform simplifies complex IT tasks, and supports physical servers, virtual machines, and public and private cloud deployments...

Advancing SD-WAN Fuels Latest Riverbed, Xirrus AP Release

by Elizabeth O'Dowd

Riverbed announced the release of a new Xirrus Wi-Fi access point (AP) that utilizes SD-WAN and supports intelligent management and edge computing devices. The Riverbed Xirrus Wave 2 AP operates on the 802.11ac standard and was built to support...

Successful Healthcare Cloud Depends on Network Connectivity

by Elizabeth O'Dowd

Zayo announced its collaboration with Peak 10 by providing its CloudLink service in Peak 10 data centers. This allows Peak 10 users to access Zayo’s fiber network while leveraging the healthcare cloud. Zayo’s fiber network connects...

Healthcare Cyberattacks Remain Persistent Despite Better HIT

by Elizabeth O'Dowd

A recent KPMG survey found that the healthcare industry has experienced an increase in healthcare cyberattacks and data loss since 2015. The healthcare executives polled stated that while they are more prepared than ever, they still experienced...

Hybrid SD-WAN Enhances Healthcare Network Management

by Elizabeth O'Dowd

CenturyLink announced the release of its managed hybrid software-defined networking in the WAN (SD-WAN) solutions that will allow organizations to manage traffic flow across the broadband network as well as private MPLS networks. SD-WAN significantly...

Visibility, Automation Defend Against Network Security Threats

by Elizabeth O'Dowd

Fluency announced the availability of its Security Analytics and Orchestration (SAO) solution version 5.5, adding further protection from network security threats in the wake of WannaCry. The solution uses focused analytics to help organizations...

Internet of Medical Things Security Gaps Threaten Health IT

by Elizabeth O'Dowd

Organizations are rapidly adopting mobile devices, which requires them to consider Internet of Medical Things (IoMT) security and what steps need to be taken to secure the devices. Most IoMT devices, such as wearables and monitors, don’t...

Extreme Networks Acquires Enterprise Networking Business

by Elizabeth O'Dowd

Extreme Networks announced its acquisition completion of Avaya’s enterprise networking business. The acquisition will allow the company to grow in its end-to-end software driven solutions. Extreme Networks will acquire Avaya’s network...

BCM, Disaster Recovery Give Visibility During Data Breaches

by Elizabeth O'Dowd

Business continuity management (BCM) and disaster recovery are two tools that work together to detect data breaches and ensure workflows remain uninterrupted. According to the Business Continuity Institute, BCM is the “holistic management...

X

Sign up for our free newsletter covering the latest IT technology for Hospitals:

Our privacy policy

no, thanks