- How Smart Hospitals Are Improving Healthcare
Blockchain technology, wearable technology, precision medicine and virtual rehab used in orthopaedics will lead to the next generation of hospitals -- smart hospitals. As these technologies continue to grow over the next five years, the healthcare IT solutions they’ll produce will undoubtedly provide better clinical and financial outcomes.
Read More
- Researchers Found the Biggest Botnet Dedicated to Hidden Monero Mining
More than a half million Windows machines, mostly servers, have been zombified by Monero mining malware spread by a cyber gang that created the biggest mining botnet found to date. This botnet is called Smominru.
Several security companies have released their research on this cyber group activity. It is a relatively new gang. Crooks started their operations not earlier than the previous year.
Read More
- Top 10 Reasons Why Security Software Fails
Present-day malware is groundbreaking enough to slip under the radar of traditional defenses. Cybercriminals have plenty of time and resources to test their perpetrating code extensively. The malicious code can then potentially circumvent regular detection mechanisms and raise no red flags for days on end.
Read More
- Penetration Testing Methodology for PCI DSS
The Payment Card Industry Data Security Standard (PCI DSS), which applies to all organizations that process, store, or transmit credit card information, was established over a decade ago to reduce the risk of credit fraud. PCI DSS has evolved over the years, but penetration testing was recently incorporated as a requirement.
Read More
- They All Ask for a Risk Assessment : Have You Completed Yours This Year?
Yes, they all ask for a risk assessment. If you, as a healthcare covered entity or a healthcare business associate, ever get audited by the Office of Civil Rights (OCR), or if you have already had the pleasure of being audited, you will know that one of the first things OCR will ask you for is a documented risk assessment or risk analysis (these terms are used interchangeably in this post).
Read More
- Healthcare Cybersecurity: How to Prevent a Complete Medical Meltdown
Falling victim to cybersecurity can happen to anyone at any given time – leaving your medical practice at risk for the safety of those whose case sensitive information have been stolen. Thus, it’s absolutely paramount that certain cybersecurity measures are put in place before you become the next healthcare cybersecurity risk.
Read More
- Ransomware Response Plan – Crucial for Every Organization
It is crucial to decide beforehand what the organization would do if it has contractual agreements to deliver vendor or client data, but it cannot do so because that data is encrypted. Some additional force majeure type clauses may have to be inserted in all the contracts if possible stating that if the organization is under Ransomware attack and the data is still encrypted; it will not be able to provide it.
Read More
- The Importance of a Ransomware Response Plan
Over the past three years, ransomware has come prominently into the limelight of the cyber threat scene, it is the fastest growing malware threat, and organizations have paid US$ 209 million in Q1 2016 through ransomware, FBI estimates US$ 1 billion losses in 2016 because of ransomware.
Read More
- Medical Practice Technical Risks – What Are They and How Can They Be Mitigated?
Explanation: A user identifier is typically a name or a number or a combination of numbers and characters put together to form a string of characters that uniquely identify a user. This unique user identifier allows the information system to track the activities that a user makes in the information system. This is done so that every user of the system can be held accountable for his/her functions performed on the information systems that have ePHI in it.
Read More
- Physical Risks in Medical Practice and Their Mitigation
In the event of an emergency, a well defined contingency plan helps the team to allow for data restoration in addition to providing physical security. A contingency plan is usually used when there is an emergency, for example when there is an outage. During the crisis it is important that the doctors still have access to ePHI so that the quality of care is not compromised.
Read More