This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
We reached out to our incredible Healthcare IT Today Community to get their insights on what will happen in the coming year and boy did they deliver. By adopting passwordless authentication tailored to diverse healthcare workflows, organizations can protect sensitive data, boost operational efficiency, and enhance patient care.
"The rapid pace at which telehealth applications were rolled out during the pandemic made them attractive targets for cybercriminals," said Sam Kassoumeh, COO and cofounder of SecurityScorecard in a statement provided to Healthcare IT News. " Kat Jercich is senior editor of Healthcare IT News. Twitter: @kjercich.
The following is a guest article by Jason Griffin, MBA, CISM, Managing Director of Digital Health Strategy and Cyber Security Practice Leader at Nordic Consulting Over my 25-plus years working in healthcare information technology, I’ve witnessed firsthand the exponential growth of the threat landscape.
The mass swaths of health-related data enable healthcare entities to better manage the health of entire populations by helping identify trends and develop strategies based on vast evidence. Data sharing also has more big-picture benefits. They also cause reputational damage.
Healthcare organizations are increasingly pressured to innovate and adapt, all while still managing IT costs. As cloud costs increase and AI’s implementation becomes increasingly complex, succeeding with this technology requires having a dynamic, flexible IT strategy.
We asked the Healthcare IT Today community to submit their predictions and we received a wide ranging set of responses that we grouped into a number of themes. Defending against these attacks must be a top priority for healthcarecybersecurity professionals. In 2024, the attack surface will continue to grow.
Regrettably, AI-based cyberattacks pose a large threat to an already vulnerable healthcare industry. Building a Proactive Cybersecurity Stance Part of a renewed strategy to keep organizations protected is through proactive cybersecurity. Organizations can, however, leverage AI to fight back.
From the Change Healthcare ransomware attack that exposed the personal and health information of over 100 million individuals to even one of the more recent attacks on Texas Tech University that leaked 2.1 million files of stolen data – both of which underscore the urgency to intensify cyber defense strategies.
Different engineering strategies are needed to deliver scalable, secure, and stable software coupled with a dynamic cloud ecosystem. Using these tools can be complex, requiring updates by engineering staff on a regular basis, complete with regression testing and a staged deployment strategy to avoid production outages.
The urgency to translate this guidance into actionable strategies has never been higher. While progress has been made, many healthcare organizations remain vulnerable to critical threats.
The following is a guest article by David Sampson, VP of Cyber Risk and Strategy at Thrive It’s time for healthcare organizations to reevaluate their cybersecurity posture and cyber resilience.
The length and severity of the incident not only had the healthcare industry talking about cybersecurity, but it also remained a topic of discussion in the broader tech media It was understandable that much of that discussion focused on how and where healthcare was falling short on cybersecurity. Tell us what you think.
Welcome to our Healthcare IT Today Weekly Roundup. Each week, well be providing a look back at the articles we posted and why theyre important to the healthcare IT community. Read more… Navigating New HealthcareCybersecurity Regulations. Read more… Proactive Strategies to Combat IoT and AI Vulnerabilities.
Experts have repeatedly predicted that telehealth would present a major challenge for healthcarecybersecurity in the coming year. "We've been measuring the risks and the threat for telemedicine-type services for many years," said Christopher Logan, director of healthcare industry strategy at VMWare.
Jones has a proven track record of scaling operations, driving growth, and executing successful go-to-market strategies. Most notably he served as Chief Operating Officer of Cylera, a healthcare IoT cybersecurity company, and also as Chief Strategy Officer at RSA.
To help you sift through this sea of AI, we reached out to our incredible Healthcare IT Today Community to help us assemble a list of the most promising AI applications for improving patient outcomes and streamlining healthcare operations. The following is what they had to share with us. So many good insights here!
We reached out to our brilliant Healthcare IT Today Community to ask them – what can be done to train your staff from becoming a vulnerability to your healthcare organization? But with proper and regularly scheduled training, we can minimize these mistakes. But what should that training look like? The following are their answers.
How can healthcare organizations ensure the security and privacy of patient data while managing large volumes of electronic health records (EHRs) ? We reached out to our incredible Healthcare IT Today Community for their insights into this question and the following is what they had to share.
The consequences of cyber risks can be incredibly severe as healthcare data is particularly personal and sensitive," said Kelly Rozumalski, secure connected health director at Booz Allen, in a statement to Healthcare IT News. Kat Jercich is senior editor of Healthcare IT News. WHY IT MATTERS. "Large U.S.
Constitution as one of the original agencies," she told top healthcarecybersecurity leaders there to discuss the best cybersecurity practices and strategies to secure data and ultimately protect healthcare delivery. Andrea Fox is senior editor of Healthcare IT News. system of weights and measures.
Contract Enforcements Tie Cybersecurity to Financial Fraud and Liability The receptionist you yelled at for shopping online could turn you in and get a $900,000 reward. When it comes to compliance, ignoring the contracts you sign – including with Medicare and your insurance policies – can hit you really hard and really fast.
It’s new approaches and ideas like these that will build a skilled workforce that is ready to protect the healthcare delivery system from existing and future cybersecurity threats. The HHS goes on to propose a strategy to support greater enforcement and accountability. Here I agree – we can use all the help we can get.
Zero-trust security strategies have emerged as a strong way to reduce the risk of a data breach. On top of all this, the healthcare industry is highly regulated, and organizations need to know where PHI is stored and who has access to it in order to ensure they are in compliance.
The company was founded in 2021 in response to the growing number of cyber attacks on the healthcare industry and stands out as the sole cyber intelligence entity exclusively devoted to healthcare. “Our platform synthesizes, aggregates, and contextualizes this data, offering clarity and actionable strategies. .
Incorporate diverse strategies to improve cybersecurity, including: Zero-Trust A zero-trust fabric is your blank slate, starting every person and system at square one. With it, your cybersecurity is configured in such a way that no devices, users, or applications are inherently trusted.
Consulting which looked into the cybersecurity landscape of the region and how policies and other measures apply in the rising remote care segment. WHY IT MATTERS Healthcarecybersecurity frameworks across APAC nations, the report noted, are "not fully adapted" to remote care solutions nor are these harmonised across jurisdictions.
Healthcare IT News interviewed Reimer to discuss in detail these issues and programs, and additionally get some tips from him on one of his focus areas, information security preparedness. Sanford Health is well positioned to navigate these challenges through innovative strategies. Healthcare IT News is a HIMSS Media publication.
The following is a guest article by Ryan Witt, HealthcareCybersecurity Leader at Proofpoint The Internet of Medical Things, or IoMT, is a deep web of interconnected devices that increasingly plays a vital role in care delivery. About Ryan Witt Ryan Witt is a healthcarecybersecurity leader at the cybersecurity company Proofpoint.
Healthcare organizations continue to represent a prime target for hackers – if not the leading one: The average cost of a breach for the industry now stands at $7.13 The following is a guest article by Monique Becenti, Security Strategist, Pondurance.
For the 55th episode of the CIO podcast hosted by Healthcare IT Today, we are joined by Steven Ramirez, VP & CISO at Renown Health to talk about healthcare security! We kick off the episode by discussing the biggest challenges facing the healthcare industry today. What does that mean for a healthcare organization?
The following is a guest blog post by Justin Campbell, Vice President, Strategy, at Galen Healthcare Solutions. According to an investigation by ProPublica and German radio and TV network Bayerischer Rundfunk, medical data of more than 5MM U.S.
The following is a guest article by Mike Noshay, MSE, Founder and Chief Strategy & Marketing Officer at Verinovum. This time last year, we healthcare leaders were excited to be looking ahead to 2021 and leaving 2020 firmly behind us. But our dreams of putting the pandemic in the past were put on pause. Now, […].
Welcome to our Healthcare IT Today Weekly Roundup. Each week, we’ll be providing a look back at the articles we posted and why they’re important to the healthcare IT community. We asked the Healthcare IT Today community to tell us about new innovations in these fields. Big News From the ONC Meeting: QHINs, TEFCA, and HTI-1.
About Sharat Potharaju Sharat Potharaju is the Co-Founder and CEO at Uniqode, responsible for crafting the overall strategy and execution. Modern solutions make the security versus efficiency trade-off obsolete. Prior to his entrepreneurial career, Sharat spent a few years working in investment banking at Merrill Lynch in New York.
Considering that HDOs also face severe reputational damage if they allow a data breach—harm that cyber insurance cannot mitigate—prioritizing more effective cybersecurity can pay additional dividends compared to taking a more insurance-reliant strategy. In response, HDOs are exploring strategies to efficiently reduce risk.
We reached out to our brilliant Healthcare IT Today Community for their insights into this matter. We asked them – with this ongoing era of increasing cyber threats, what measures are organizations implementing or should be implementing to strengthen the cybersecurity of healthcare systems and protect patient data ?
The following is a guest blog post by Justin Campbell, Vice President, Strategy, at Galen Healthcare Solutions. When decommissioning healthcare systems to archive legacy data, there are often significant tradeoffs.
HealthcareCybersecurity: A Life and Death Situation A successful cyberattack on a healthcare organization can result in a wide range of consequences. Building Cyber Resilience in Healthcare Multiple agencies are currently investing in the network fortification of healthcare systems.
Tom Stafford, Director, HealthcareStrategy at CDW , has a chance to talk with and advise a lot of healthcare organizations. Learn more about CDW: [link] Learn more about Proofpoint: [link] Listen and subscribe to the Healthcare IT Today Interviews Podcast to hear all the latest insights from experts in healthcare IT.
So, as healthcare embraces digital transformation, what considerations and safeguards are in place to address potential vulnerabilities in connected medical devices and IoT within the healthcare ecosystem? We reached out to our insightful Healthcare IT Today Community with this question and the following is what they had to share.
As the industry navigates this perilous digital terrain, understanding, managing, and effectively integrating cyber insurance into its risk management strategies has never been more critical. This post presents cost-effective cybersecurity solutions for healthtech leaders to consider. More on this strategy later.
We reached out to our incredibly talented Healthcare IT Today Community for these answers. The following is what they had to say on how to stay safe and can be used as a little check list for your healthcarecybersecurity efforts. Updating cybersecurity software regularly is essential against digital threats.
The GRC program serves as the foundation for the organizations business resilience efforts, aligning your business and IT strategies while driving standardization across the enterprise. The role of technology is to automate the programmatic security controls identified and organized by the GRC program.
We organize all of the trending information in your field so you don't have to. Join 48,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content