Remove Health Information Remove Healthcare Cybersecurity Remove Leadership
article thumbnail

Health Information Security – My Interview with Richard Kaufmann, CISO of Amedisys – Part 1: Origin Stories, the Security Ecosystem, and the Start Line

Health Populi

looking back and looking forward to the future of cybersecurity in health care and some wisdom to help us manage that future world of risks. JSK: What’s your origin story with health information security? For highly regulated industries like healthcare, cybersecurity and data protection go hand in hand.

article thumbnail

Healthcare Cybersecurity – 2024 Health IT Predictions

Healthcare IT Today

All of this year’s 2024 health IT predictions (updated as they’re shared): John and Colin’s 2024 Healthcare IT Predictions Health Equity Predictions Healthcare Cybersecurity Predictions And now, check out our community’s Healthcare Cybersecurity predictions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why HHS’ Cybersecurity Concept Paper Falls Short for Healthcare

Healthcare IT Today

For example, in the healthcare industry, we have to abide by HIPAA — a law that helps protect the privacy and security of people’s health information. We can’t serve our patients if we don’t ensure that protected health information (PHI) is kept private.

article thumbnail

Ransomware, Cloud, and Phishing: Decoding this Year’s Cybersecurity Landscape

Healthcare IT Today

In the first half of the year alone, we saw major incidents like the Change Healthcare breach , which affected up to one-third of Americans , and the Ascension ransomware attack , which disrupted hospital operations across the U.S., impacting electronic health records and patient portals.

article thumbnail

Healthcare Cybersecurity Is Difficult to Maintain, How a Security Operations Center Can Help

Healthcare IT Today

The mission of a SOC is to protect valuable customer/client data, protected health information, and intellectual property, achieved primarily through the prioritization, collection, and processing of security logs. What Should Be Included in a SOC?

article thumbnail

How Healthcare Organizations Can Deploy Data Security More Holistically To Prevent Third-Party Breaches

Healthcare IT Today

The prevalent use of outdated legacy systems by healthcare organizations and their vendors creates gaps in their security posture through unpatched vulnerabilities, weak access control mechanisms, and unsophisticated authentication requirements.

article thumbnail

How Healthcare Organizations Can Reduce Risk with Zero Trust

Healthcare IT Today

Risks Unique to the Healthcare Industry The healthcare sector is especially vulnerable to attacks because of its reliance on electronically stored protected health information (PHI), including records, scans, and bills.