HITInfrastructure

Security News

Lack of Design Phase Involvement Threatens Medical IoT Security

August 17, 2017 - A recent Deloitte poll identified that legacy and fielded medical Internet of Things (IoT) devices challenge provider connected device ecosystems, indicating that medical IoT security continues to test healthcare organizations. Thirty-six percent health IT infrastructure professionals polled stated that their organization had experienced a cybersecurity incident in the past year. Respondents...


Articles

HIMSS Finds Improved HIT Network Security Infrastructure

by

Organizations need to enhance their HIT network security infrastructure as more advanced cyberattacks continue to threaten clinical data. HIMSS released its latest cybersecurity survey, which highlights the importance of cybersecurity to health...

Utilizing SIEM to Support Real-Time Cybersecurity Monitoring

by

Organizations digitizing their health IT infrastructures are vulnerable to different cybersecurity threats. Network cybersecurity monitoring solutions, such as security information and event management (SIEM) solutions, can provide much needed...

Healthcare Cyberattacks Remain Persistent Despite Better HIT

by

A recent KPMG survey found that the healthcare industry has experienced an increase in healthcare cyberattacks and data loss since 2015. The healthcare executives polled stated that while they are more prepared than ever, they still experienced...

Visibility, Automation Defend Against Network Security Threats

by

Fluency announced the availability of its Security Analytics and Orchestration (SAO) solution version 5.5, adding further protection from network security threats in the wake of WannaCry. The solution uses focused analytics to help organizations...

Internet of Medical Things Security Gaps Threaten Health IT

by

Organizations are rapidly adopting mobile devices, which requires them to consider Internet of Medical Things (IoMT) security and what steps need to be taken to secure the devices. Most IoMT devices, such as wearables and monitors, don’t...

Using Firewalls to Prevent Health Data Security Risks

by

Outside attacks pose healthcare data security risks as organizations continue to digitize their IT infrastructures. The advanced technology being deployed needs to be protected, which is why network firewalls need to adapt to current and future...

Trend Micro Adds Mobile Security, Device Monitoring Tools

by

Trend Micro joined VMware’s Mobile Security Alliance by integrating its Mobile Security for Enterprise solution with AirWatch and VMware Workspace ONE to enhance device monitoring and mobile security. The partnership aims to make it easier...

Healthcare Blockchain Set to Digitally Transform Health IT

by

Healthcare blockchain is gaining interest as organizations seek alternative ways to protect and share clinical data. Blockchain has piqued the interest of many organizations seeking a better way to efficiently store and share data. A recent Frost...

BCM, Disaster Recovery Give Visibility During Data Breaches

by

Business continuity management (BCM) and disaster recovery are two tools that work together to detect data breaches and ensure workflows remain uninterrupted. According to the Business Continuity Institute, BCM is the “holistic management...

Healthcare Data Migration Benefits from Cloud Tools

by

Every organization will undergo major and minor healthcare data migrations as clinical data needs to be moved to more advanced and scalable storage solutions. Understanding the data so the migration is done correctly the first time is the biggest...

How Developers Can Improve Healthcare Application Security

by

The healthcare security breaches can be devastating to the industry. Healthcare application security is a particularly growing concern as entities continue to add apps to their health IT infrastructures. Medical identity theft is also expected...

Healthcare SIEM Uses Real-Time Data for Network Security

by

Healthcare security information and event management (SIEM) allows organizations to analyze security data in real-time to detect cyberattacks the moment they occur providing more advanced network security. The HIPAA omnibus rule was updated last...

Microsoft Vulnerabilities May Still Impact Health IT Security

by

The Healthcare Cybersecurity and Communications Integration Center (HCCIC) released a statement warning healthcare organizations about further Microsoft vulnerabilities related to how WannaCry spread late last month, potentially impacting health...

Cybersecurity Task Force Urges IT Infrastructure Improvements

by

The Health Care Industry Cybersecurity Task Force recently released a report detailing how healthcare organizations can address the growing threat of cyber-attacks to health IT infrastructure. The report discusses the development of the Task...

Cloud-Based HIT Disaster Recovery Prevents Data Loss, Downtime

by

Healthcare organizations are still hesitant to migrate to cloud-based HIT infrastructure systems because of security concerns stemming from storing PHI in an off-premises location. The recent WannaCry ransomware attack reiterates that fear, which...

Study Finds Significant Lack of Medical Device Security

by

Sixty-seven percent of medical device manufacturers and 56 percent of healthcare organizations believe that an attack on medical devices built or used by their organizations will happen within the next year, according to a recent Synopsys and...

NIST Guide Focuses on Healthcare Wireless Network Security

by

Clearwater Compliance announced its partnership with NIST and the National Cybersecurity Center of Excellence (NCCoE) to help organizations improve healthcare wireless network security. The partnership focuses on securing wireless infusion pumps....

WannaCry Ransomware Targeted Outdated HIT Infrastructure

by

Late last week, many countries around the world fell victim to the WannaCry ransomware attack. The cybersecurity breach targeted healthcare organizations and made its way to the US, after first heavily affecting the National Health Service (NHS)....

Blue Cedar Releases Enterprise Mobility Management Alternative

by

Blue Cedar announced the release of its new enterprise mobile security platform aimed at extending traditional enterprise mobility management (EMM) solutions. The platform provides secure data access for all end users and secured mobile data...

X

Sign up for our free newsletter covering the latest IT technology for Hospitals:

Our privacy policy

no, thanks