The search found 3760 results.
Blog
Since 2020, hospitals and healthcare organizations suffered brutal ransomware and phishing attacks during the COVID-19 pandemic. Healthcare cyber attacks came from all sides and caught facilities off guard, from the aggressiveness and sheer volume of hacks and cyber threats.
Blog
Let’s face it: When it comes to data security, ensuring your company’s compliance can be a headache, no matter the industry. Unfortunately, this problem is made even worse by the realization that compliance requirements extend beyond your internal operations.
Blog
Compliance teams in healthcare organizations have the important task of ensuring patient data is protected from unwarranted access. It is a crucial job within the organization, due to the fact that it is difficult to restrict access to medical workers in the healthcare setting, and restricting access to EMRs could make it more difficult for them to do their daily, or emergency-related tasks.
News
"From the fields of Fenway Park to the halls of the emergency department at Beth Israel Deaconess Medical Center in Boston to the classrooms of the University of Florence in Italy, Dr. Sean Kelly is on the forefront of both the COVID-19 pandemic and the cybersecurity threat-outbreak that is plaguing healthcare institutions across the country."
News
"Imprivata is trying to make it easier for healthcare organizations to adapt to the new digital work environment. The company noted that many healthcare organizations are not as secure as they once were, largely because access control has become far more complicated than locks and doors. Employees are using digital applications and gaining access to sensitive materials from a rapidly expanding array of devices and locations, and that remote and cloud setup has exposed potential gaps in many cybersecurity setups."
News
"Organizations in the healthcare sector – and especially those engaged in delivering healthcare services – have always been juicy targets for cyber attackers."
"But while in the past they were mostly after patients’ personal, health and financial data these organizations store to be able to provide services, the advent of ransomware has dramatically changed the threat landscape they must face."
Read the full article on www.helpnetsecurity.com
Press
Provides key security and compliance guidance for a comprehensive digital identity strategy
Blog
If you’re in the cybersecurity field, chances are you’ve heard of the castle-and-moat strategy of securing sensitive systems. This strategy focuses on securing the castle (or sensitive system) from external threats while placing minimal controls on trusted insiders.