Security Awareness

Assessing IoT Risks in Healthcare Environments

Healthcare organizations should steer clear of connecting internet of things devices to their networks unless they serve a precise medical purpose, says attorney Julia Hesse.”There was a rise a few years ago … of internet connected light bulbs and internet connected beds,” she notes in an interview with Information Security Media Group. “From our perspective,

[ Read More ]

Tech is invading our medical privacy: another reason to beware Dr Google

Medics are using more and more AI tools but how safe is your data? Googles search facility has transformed our lives. Whether its the times of shows at your local cinema or academic research via Google Scholar, information is available at our fingertips.Whats not to like?Well, when it comes to trust in large technology companies,

[ Read More ]

Privacy and Data Security Strategies for Start-Up Companies

Start-up companies know that, when potential investors kick the tires, they will look carefully at the companys business model and IP portfolio. These days, investors are also likely to look at whether the company is in compliance with privacy and data security laws. Cybersecurity has become increasingly important for business of all sizes. While identity

[ Read More ]

Mergers & Acquisitions: Privacy and Security Considerations

How do data privacy and security matters affect organizations that are contemplating a merger or acquisition? Attorney Iliana Peters offers insights into the various cybersecurity, data breach and compliance issues that can potentially doom a business deal.For instance, an organization that is being targeted for acquisition might have additional hurdles to overcome if it is

[ Read More ]

My Health Record Changes: Too Little, Too Late?

Australia’s Parliament has passed legislation that strengthens privacy protections for My Health Record, the country’s embattled digital medical records program. The new changes, called the My Health Records Amendment (Strengthening Privacy) Bill 2018, aim to assuage concerns that entities outside of care providers, such as employers and insurers, could gain access to records. Also, there

[ Read More ]

Endpoint Security: Managing the Impact on Clinical Workflow

When implementing endpoint security solutions in healthcare environments, a critical consideration is the impact of the technology on clinical workflow, says Dave Summitt, CISO at the H. Lee Moffitt Cancer Center and Research Institute in Tampa, Florida.For example, When Moffitt implemented a new anti-malware solution several years ago, Summitt’s team quickly learned that running the

[ Read More ]

AMIA calls for tighter coordination of data privacy rules

Informatics group said the blurring lines between consumer and medical information systems demands privacy policies relevant to both sides. The American Medical Informatics Association is asking the Trump administration to take a close look at both HIPAA and the Common Rule to see how they might be updated or harmonized for a new era of

[ Read More ]

Your Healthcare Organizations Been Hacked: Now What?

For healthcare covered entities and business associates, building up defenses to prevent cyberattacks is only half the battle. Here are some steps to consider in the aftermath of an incident. Organizations can optimize incident response in several ways. For instance, entities such as health systems can develop notification templates to determine ahead of time whom

[ Read More ]

Giving CISOs the tools to measure and improve password security

Weak, reused, old and potentially compromised credentials open organizations up to innumerable data security risks that could be easily avoided. Despite the well-publicized growth in cyber-attacks every year, both in number and complexity, organizations are still struggling to implement effective security policies. Its no secret that weak passwords are a leading security threat and bad

[ Read More ]