HITInfrastructure

Security News

How Visibility Provides Stronger Healthcare Cloud Security

by

TrapX Security announced integrated cloud data support for its DeceptionGrid solution for Amazon AWS EC2 and KVM Open stack. The integration is a response to the cloud security challenges presented by public and private cloud across all...

2018 EHNAC Accreditation Impacts Secure Data Exchange

by

The non-profit standards development organization, Electronic Healthcare Network Accreditation Commission (EHNAC) announced the new versions of program criteria for its 18 accreditation programs impacting secure data exchange. Healthcare...

HIT Infrastructure Consolidation Increases Efficiently, Security

by

NIST released a new draft version of its Risk Management Framework for Information Systems and Organizations outlining how healthcare organizations can most effectively structure their HIT infrastructure. The draft guidance presents...

Healthcare Industry Now a Leading Target for Cyberattacks

by

Healthcare surpassed the public sector this year in reporting the greatest number of security incidents in Q2, according to a new study released by McAfee. The healthcare industry accounted for 26 percent of cyberattacks over between...

BYOD Policies Challenge Health IT Infrastructure, Data Security

by

Bring-your-own-device (BYOD) policies are becoming more common but healthcare organizations struggle with BYOD policies and how to make sure data is secure on devices they don’t own. A recent Spok study polled over 350 healthcare...

Threat Intelligence Adoption Tests HIT Infrastructure Security

by

Large cyberattacks plague the healthcare industry as organizations are challenged with introducing and maintaining threat intelligence as part of their HIT infrastructure security. The Ponemon Institute’s second annual cybersecurity...

Connected Medical Devices Need Current HIT Infrastructure Security

by

Organizations are adding more connected medical devices to their HIT infrastructure, which raises concerns about device security. A recent Research and Markets report predicted that the medical device security market will reach $28.9...

Interoperability Stressed in Recent FDA Medical Device Guidance

by

The FDA released a final guidance for smart and secure interactions among medical devices, emphasizing the importance of incorporating interoperability among devices in the design stage. “FDA intends to promote the development and...

Lack of Design Phase Involvement Threatens Medical IoT Security

by

A recent Deloitte poll identified that legacy and fielded medical Internet of Things (IoT) devices challenge provider connected device ecosystems, indicating that medical IoT security continues to test healthcare organizations. Thirty-six...

HIMSS Finds Improved HIT Network Security Infrastructure

by

Organizations need to enhance their HIT network security infrastructure as more advanced cyberattacks continue to threaten clinical data. HIMSS released its latest cybersecurity survey, which highlights the importance of cybersecurity to...

Utilizing SIEM to Support Real-Time Cybersecurity Monitoring

by

Organizations digitizing their health IT infrastructures are vulnerable to different cybersecurity threats. Network cybersecurity monitoring solutions, such as security information and event management (SIEM) solutions, can provide much...

Healthcare Cyberattacks Remain Persistent Despite Better HIT

by

A recent KPMG survey found that the healthcare industry has experienced an increase in healthcare cyberattacks and data loss since 2015. The healthcare executives polled stated that while they are more prepared than ever, they still...

Visibility, Automation Defend Against Network Security Threats

by

Fluency announced the availability of its Security Analytics and Orchestration (SAO) solution version 5.5, adding further protection from network security threats in the wake of WannaCry. The solution uses focused analytics to help...

Internet of Medical Things Security Gaps Threaten Health IT

by

Organizations are rapidly adopting mobile devices, which requires them to consider Internet of Medical Things (IoMT) security and what steps need to be taken to secure the devices. Most IoMT devices, such as wearables and monitors,...

Using Firewalls to Prevent Health Data Security Risks

by

Outside attacks pose healthcare data security risks as organizations continue to digitize their IT infrastructures. The advanced technology being deployed needs to be protected, which is why network firewalls need to adapt to current and...

Trend Micro Adds Mobile Security, Device Monitoring Tools

by

Trend Micro joined VMware’s Mobile Security Alliance by integrating its Mobile Security for Enterprise solution with AirWatch and VMware Workspace ONE to enhance device monitoring and mobile security. The partnership aims to make it...

Healthcare Blockchain Set to Digitally Transform Health IT

by

Healthcare blockchain is gaining interest as organizations seek alternative ways to protect and share clinical data. Blockchain has piqued the interest of many organizations seeking a better way to efficiently store and share data. A...

BCM, Disaster Recovery Give Visibility During Data Breaches

by

Business continuity management (BCM) and disaster recovery are two tools that work together to detect data breaches and ensure workflows remain uninterrupted. According to the Business Continuity Institute, BCM is the...

Healthcare Data Migration Benefits from Cloud Tools

by

Every organization will undergo major and minor healthcare data migrations as clinical data needs to be moved to more advanced and scalable storage solutions. Understanding the data so the migration is done correctly the first time is the...

How Developers Can Improve Healthcare Application Security

by

The healthcare security breaches can be devastating to the industry. Healthcare application security is a particularly growing concern as entities continue to add apps to their health IT infrastructures. Medical identity theft is also...

X

Sign up for our free newsletter covering the latest IT technology for Hospitals:

Our privacy policy


no, thanks

Continue to site...