Patient data privacy News

View All News

Patient data privacy Get Started

Bring yourself up to speed with our introductory content

  • Hospitals bone up on medical device cybersecurity plans

    Healthcare cybersecurity can be likened to those old movie westerns pitting the good guys against the bad guys. Back then, however, it was easy to distinguish the white hats from the black hats. Not so in today's complex, sinister world of computer hacking, malware, ransomware and botnets, where the black hats stealthily maneuver through the shadows of a cyberspace that has often been compared to the wild wild west. In some respects, healthcare systems have shown definite signs of improvement in preventing certain types of cybercrimes. But crime reductions in one area can mean increases in other areas as cybercriminals turn their attention to easier and perhaps more lucrative targets that threaten medical device cybersecurity.

    The March issue of Pulse opens with the recognition that hackers are forever vigilant at concocting new and innovative ways to steal patient information and disrupt hospital operations. To add insult to injury, the perpetrators are now offering their hacking "best practices" as a service for less than altruistic reasons.

    Along those lines, our cover story reports on healthcare's increasing use of and dependence on connected medical devices and the resulting vulnerability to hacks, namely ransomware. But IT analysts and security executives see artificial intelligence and blockchain as effective weapons in strengthening medical device cybersecurity. In another feature, we examine the misconception that security measures to safeguard electronic protected health information contained in clinical files march in lockstep with HIPAA privacy laws. To overcome that false sense of security, healthcare organizations need to closely assess key HIPAA mandates like risk analysis and policy audits.

    Also in this issue, crippling ransomware attacks are supplanting health data breaches as the greatest enemy to patient privacy and safety. Statistics show that even though the number of patient records breached plummeted last year, ransomware and malware incidents doubled, security threats from insiders continued unabated, and health organizations took longer to discover they were breached. But there are several steps CIOs and CISOs can follow to protect patient information and shore up cybersecurity.

     Continue Reading

  • Making the case for healthcare IoT: Is it necessary?

    A standardized and connected ecosystem can provide easy and seamless access to one critical industry: healthcare. Zephyr Health's William King outlines three critical value drivers of healthcare IoT. Continue Reading

  • What are some useful multifactor authentication examples?

    Health IT expert Brien Posey offers some examples of multifactor authentication as a way for hospitals to further safeguard access to protected health information. Continue Reading

View All Get Started

Evaluate Patient data privacy Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Patient data privacy

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Patient data privacy Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve