article thumbnail

Healthcare Cybersecurity – 2025 Health IT Predictions

Healthcare IT Today

Check out our community’s Healthcare Cybersecurity predictions: Bill Murphy, Director of Security and Compliance at LeanTaaS As we enter 2025, AI is revolutionizing cyber threats in concerning ways. Generative AI will accelerate proactive threat hunting and attack path analysis, addressing vulnerabilities before breaches occur.

article thumbnail

Working Together for Stronger Healthcare Cybersecurity – A Look At 405(d)

Healthcare IT Today

There are new cybersecurity tools for protecting patient safety that every healthcare organization should know about. Pointing out that institutions usually underinvest in cybersecurity, Decker says that these two new assessment tools can help answer the question: “Does the investment lead to an outcome?”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guide to a Proactive Healthcare Cybersecurity Stance

Healthcare IT Today

Cybersecurity risk assessments and analysis should be conducted at least annually and it should identify all assets that may process, store, or transmit sensitive data so that they can be secured.

article thumbnail

A Look at Changes in the NEW HIPAA Security Rule

Healthcare IT Today

The most common root cause identified in HIPAA cybersecurity incident investigations is the lack of an accurate and thorough Security Risk Analysis, resulting in breaches and ransomware attacks due to unmanaged risks.

HIPAA 122
article thumbnail

The Crucial Role of Dual Incident Response Playbooks in Healthcare Cybersecurity

Healthcare IT Today

Both plans adhere to the best practices defined in the National Institute of Standards and Technology (NIST) incident response lifecycle, consisting of five stages: Preparation, Detection & Analysis, Containment, Eradication & Recovery, and Post-Incident Activity.

article thumbnail

Understanding the Top Cybersecurity Threats to Healthcare Organizations

Healthcare IT Today

The Weak Link: Internet-Facing Devices with KEVs The proliferation of CPS devices, including medical and IoT systems, has expanded the attack surface for healthcare organizations. Internet-facing devices with known exploitable vulnerabilities present a significant risk. Additionally, he serves as a member of the HSCC Cyber Working Group.

article thumbnail

Beyond Patching: Securing Medical Devices Postmarket

Healthcare IT Today

With the risk of a cyberattack on the medical device software supply chain so high, both healthcare providers and medical device manufacturers are taking a closer look at opportunities to better address cybersecurity vulnerabilities throughout the device lifecycle.