It was a shock for Abernathy, who says the office normally is well-organized and efficient. But Abernathy and hundreds of other people who use DSS’ transportation service were affected this week when cyber criminals forced their way into Mecklenburg County government’s extensive network of computers and hijacked data servers that underpin critical public services. Officials
The framework would use more modern criteria, allowing comparisons to standards more in line with the tech being evaluated, according to Commissioner Scott Gottlieb.
56K patient records compromised during separate data breaches at specialty clinics in Kentucky and North Carolina
Two separate data breach incidents at specialty practices in Kentucky and North Carolina have led to nearly 60,000 compromised patient records. On Friday, the University of North Carolina Health Care’s Dermatology and Skin Cancer Center reported a data breach involving a laptop stolen during an Oct. 8 break-in. In a release, UNC Healthcare said the
U.S. healthcare entities need to keep security top of mind if they use offshore services to handle protected health information, security experts say, pointing to
Cybersecurity improvements are top-of-mind for health IT executives in the coming year, but they’re planning a more cautious approach when it comes to technologies like wearables and artificial intelligence, according to a new survey. The Pittsburgh-based Center for Connected Medicine, a partner of UPMC, and the Health Management Academy surveyed IT leaders at more than
The latest ISMG Security Report features a special report on securing medical devices. In the Security Report (click on player beneath image to listen), you’ll hear highlights from a panel – Medical Devices: Treat Them Like Untrusted End-User Devices – held at last month’s ISMG Healthcare Security Conference in New York. HealthcareInfoSecurity Executive Editor Marianne
For about two years, the healthcare industry has come up against some major cyber threats. Ransomware especially has proven problematic — along with being a nuisance — as it can shut down entire systems and disrupt care. This year saw the rise of wiper malware or ransomworms, where viruses masquerading as ransomware destroyed complete networks,
2018 is primed for blockchain, big data and cloud computing advancements, all with a better security plan
Security programs are about tradeoffs and minimizing risk. “CISOs need to help executives and board members understand the ROI, cost-benefit analysis and security program tradeoffs by articulating the business risk versus business value,” said Brendan O’Connor, security chief technology officer at Service Now, an IT and security consulting firm.
Note to Reviewers on the Update and Next Steps 2 Version 1.1 Draft 2 of Cybersecurity Framework refines, clarifies, and enhances Version 1.0 3 issued in February 2014. It incorporates comments received on Version 1.1 Draft 1. 4 Version 1.1 is intended to be implemented by first-time and current Framework users. Current 5 users should
Despite the fact that the law has been on the books for more than two decades, there’s still a lot of misconceptions about HIPAA and the ways it applies to information sharing. We’ve even heard horror stories about hospitals refusing to furnish patients with their own data, saying that doing so would be a HIPAA