The following is a guest article by Mitchell Perry, VP Compliance & Security at Access In the ever-evolving landscape of healthcare IT in US healthcare...
security
For the 117th episode of the Healthcare IT Podcast, we are diving into the Facebook pixel breach that impacted most healthcare organizations! To start off we...
The following is a guest article by Bala Kumar, Chief Product Officer at Jumio The list of responsibilities for a CISO in healthcare is constantly growing...
The following is a guest article by Narinder Singh, Co-Founder and CEO at LookDeep Health In 2016, attackers gained unauthorized access to Banner...
The previous part of this article laid down a basic premise that the purpose of security is to protect people, not computer systems or data. Let’s...
HIMSS has just released its 2016 Cybersecurity Survey. I’m not writing this article just to say that the industry-wide situation is pretty bad. In fact...
The recent hack of the Ashley Madison, Cougar Life and Established Men infidelity/hookup websites has been front page news. Overnight the lives of 50 million...
A dazed awareness of security risks in health IT has bubbled up from the shop floor administrators and conformance directors (who have always worried about...
The first part of this series of articles laid out the difficulties of securing devices in the Internet of Things (particularly those used in the human body)...
Are you confused about risks to privacy when everything from keystrokes to footsteps is being monitored? The Federal Trade Commission is confused too. In...