article thumbnail

$15M Singapore-London partnership to help stem APAC's growing healthcare cybersecurity woes

Healthcare IT News - Telehealth

While this growing connectivity does enable better patient monitoring within and beyond the hospital, it also raises cybersecurity risks, compromising patients' personal and medical data and disrupting treatment protocols and hospital operations.

article thumbnail

Connected Medical Devices—the Next Target for Ransomware Attacks

Healthcare IT Today

The following is a guest article by Ryan Witt, Healthcare Cybersecurity Leader at Proofpoint The Internet of Medical Things, or IoMT, is a deep web of interconnected devices that increasingly plays a vital role in care delivery. About Ryan Witt Ryan Witt is a healthcare cybersecurity leader at the cybersecurity company Proofpoint.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Healthcare Cybersecurity Is Difficult to Maintain, How a Security Operations Center Can Help

Healthcare IT Today

The following is a guest article by Preston Duren, Vice President of Cybersecurity Operations at Fortified Health Security The need for adequate cybersecurity has never been higher for the nation’s hospitals and health systems.

article thumbnail

Measures You Should be Implementing in Your Organization to Strengthen Your Cybersecurity and Protect Your Patient Data

Healthcare IT Today

John Chenoweth, Chief Product Security Officer at Elekta The critical mission for cyber security in healthcare is protecting patient data and ensuring continuity of care. To accomplish this, it takes a complete team effort, from device manufacturers to software developers and hospital IT security teams.

article thumbnail

Reactions to the Ascension Healthcare Ransomware Attack and Suggestions for Healthcare Organizations

Healthcare IT Today

One of hospital IT’s traditional concerns – hospital data stored in a vendor’s data center – can be a source of relief in a ransomware attack. Vendors should be ready to assist with data extracts when a hospital comes calling and hospital IT should leverage these relationships.

EHR 126