HITInfrastructure

Security News

Greater Medical Device Connectivity Prompts FDA Process Revision

November 28, 2018 - The FDA is updating its voluntary 510(k) approval process to take into account growing medical device connectivity and interoperability, the agency announced Nov. 26. The FDA explained that the 510(k)-approval process, which dates from 1976, needs to be modernized to accommodate advances in medical device technology and ensure that the devices meet more modern safety and...


Articles

Majority of Healthcare CIOs Lack Strong Trust in Data Integrity

by

More than half of healthcare CIOs lack strong trust in their data integrity, but three-quarters of healthcare organizations plan to invest in improving their data integrity, according to a survey of 85 healthcare CIOs and other senior...

Healthcare Infrastructure Security Frameworks Support Innovation

by

Healthcare infrastructure security framework are growing in importance as organizations trust PHI to digital tools. As more information is stored digitally, cyberattacks are more common and are evolving as technology solutions become more...

Legacy Security Systems Leave Healthcare IoT Device Vulnerable

by

Healthcare organizations integrating more Internet of Things (IoT) devices into their network are also charged developing strategies for managing those tools that include tools, IT administrators, and end users. A recent Zingbox survey...

Secure Communication Requires Functionality and Smooth Integration

by

Healthcare organizations are introducing increasing numbers of network connections into their health IT ecosystems. As a result, secure communication becomes a high priority for health IT departments. Each organization has unique needs...

Cloud-Based Identity and Access Management Increases Flexibility

by

Organizations are leaning towards healthcare identity and access management (IAM) solutions as they continue to add cloud-based services and mobile devices to their IT infrastructure. Research and Markets predicts that the IAM market...

Healthcare Network Firewalls Include Next-Generation Features

by

Organizations looking for healthcare network firewalls should consider the features that make each vendor unique, so they can select a solution that best meets their needs, according to Gartner’s latest Magic Quadrant...

Legacy Hardware Threatens HIT Infrastructure Security

by

Healthcare organizations are facing a “perfect storm” when it comes to HIT infrastructure security, ERI Co-Founder and Executive Chairman John Shegerian said in a report. The growth in hardware hacking puts patient data at...

Hurricane Season Threatens Healthcare Disaster Recovery Plans

by

Nearly 50 percent of healthcare organizations have doubts in their disaster recovery solutions as hurricane season begins to threaten the US, according to a DrFirst survey. Hurricane Florence is about to make landfall on the East Coast...

ClearDATA Expands HITRUST Coverage for Google, Amazon, Microsoft

by

ClearDATA announced its HITRUST Common Security Framework (CFS) Version 9.1 for its mulitcloud solutions including Amazon (AWS), Microsoft Azure, and Google Cloud Platform. The expanded CSF 9.1 covers 36 privacy and security regulations...

Increasing Healthcare Cloud Security with Bring-Your-Own-Key

by

Organizations are constantly looking for ways to gain more control over healthcare cloud security. Putting PHI into the hands of cloud service providers (CSPs) involves a high level of trust. CSPs understand the need for heightened...

Wi-Fi CERTIFIED WPA3 Improves Healthcare Network Security

by

Wi-Fi Alliance announced the third generation of Wi-Fi CERTIFIED Wi-Fi Protected Access, WPA3, has been finalized. WPA3 improves on WPA2, which has been in use for over a decade, by simplifying security features as well as improving them....

Using Threat Intelligence to Improve HIT Infrastructure Security

by

Advancing healthcare technology means that IT infrastructure security threats are becoming more sophisticated. A better view of IT infrastructure and the ability to collect and analyze threat data using threat intelligence can give...

EU Data Privacy Rule GDPR Impacts US Health IT Infrastructure

by

The EU data privacy rule, General Data Protection Regulation (GDPR), takes effect today and healthcare organizations need to be aware of the regulation changes to understand how their data exchange and access processes may be impacted....

Utilizing Healthcare Blockchain to Increase Identity Management

by

Healthcare blockchain is being used for better interoperability and data exchange, and is also being leveraged for identity management so organizations can build a more solid digital trust. The strong demand for blockchain identity...

Healthcare Cloud Security Relies on Infrastructure Visibility

by

Organizations have gone through different periods of trust with the healthcare cloud as the technology becomes a staple in health IT infrastructure. Providers were initially hesitant with cloud adoption. How could the cloud, especially...

Compliance Testing Remedies HIT Infrastructure Vulnerabilities

by

Organizations expanding their IT environment are tasked with choosing tools that are in compliance with HIPAA and can be used securely and efficiently in a healthcare environment. HIT infrastructure vulnerabilities threaten patient data...

Windows Vulnerability Potentially Exposes Healthcare Networks

by

Windows faces a further vulnerability as the latest update to the meltdown bug exposed further weaknesses in the Microsoft OS. Organizations need to make a further update to their endpoints and servers operating on Windows 7 and Windows...

Threat Intelligence Supports Advanced Health IT Security

by

Health IT infrastructure technology continues to advance as organizations go through digital transformations. More advanced IT tools also means that entities are threated by more advanced cybersecurity attacks. Organizations need to look...

Managing Healthcare Apps for Better Mobile Device Security

by

Over the past several years, mobile device management strategies have evolved as healthcare organizations figure out the best way to manage their mobile devices. Implementing mobile device security without infringing on users’...

X

Sign up for our free newsletter covering the latest IT technology for Hospitals:

Our privacy policy


no, thanks

Continue to site...