Healthcare IT consultants’ work involving health records may expose them – and their provider and payer clients – to regulatory, legal, financial, and reputational risk. These risks are potentially higher in the COVID-19 era, with many of their employees working from home and accessing sensitive records and networks from remote locations. According to the US Department of Homeland Security (DHS), there is a heightened risk of phishing, SMS phishing and other attacks using COVID-19 themes, and
Read More
Phishing
5 Common Types of COVID-19 Grey Market Scams for Hospitals to Avoid
What You Should Know:
- Scammers may be trafficking counterfeit or faulty protective equipment (PPE) during COVID-19 in what is now known as the “grey market.”
- Premier outlines five common types of COVID-19 grey market scams for hospitals to avoid and key best practices to avoid them as hospital brace for the surge in COVID-19 patients.
Healthcare providers are working around the clock to safely
care for patients during the COVID-19 pandemic,
and the last thing they need to
Read More
COVID-19: Best Practices to Safeguard Organizations from Cybercriminals
While we may consider health largely a private concern in the United States, our nation depends on the continuity and availability of its healthcare system in a very public way, as evidenced by the current coronavirus outbreak. Our critical healthcare infrastructure is vulnerable at this time, no doubt, but it truly has been inspiring to see doctors, scientists, and other industry professionals from around the world come together to stop the spread of COVID-19. To fend off exploitative
Read More
Healthcare Data Infrastructure Security Cannot Be Ignored During a Pandemic
The rapid advancement of technology has inspired hope in the healthcare industry, promising to employ artificial intelligence (AI) and cloud-based data platforms in life-altering ways. Surgery assisting robots and miraculously accurate AI-based cancer diagnosis methods are a few preliminary examples of what the industry can expect. With all these great technological strides being taken, however, compliance can easily be left in the dust. And with COVID-19 pushing the limits of healthcare systems
Read More
4 Ways to Make Security Training A Priority in Your Healthcare Organization
cc
Healthcare finally made the shift–it went digital. Overdue, perhaps – and maybe less rapid than the transition by other industries – but nonetheless notable. The age of the Internet of Medical Things (IoMT) has dawned, and healthcare is riding the wave. You go, healthcare!
For healthcare organizations, the advent of IoMT means new technology tools like smart medical devices extending and streamlining care throughout the hospital. This gives clinicians more mobility and more efficiency
Read More
Addressing Healthcare’s IT Security Oversight Challenges
Data theft within the healthcare sector continues to skyrocket, led by third-party data breaches and phishing attacks. Halfway through 2019, the number of patient records breached already exceeds the 2018 number by more than 10 million. Perhaps most concerning, many of the breaches lasted weeks or months before they were discovered.
Many health executives lack direct technology experience relevant to the healthcare industry, according to a Black Book Research survey of 308 executives. In
Read More
HIT Governance: 7 Key Metrics For Your Quarterly Report Card
Healthcare organizations use data to support decision-making for nearly every area of operations. But what about your security and compliance strategy? What metrics are the most valuable to determine how your organization should allocate funding for health IT projects related to governance, risk, and compliance?
Top Seven Metrics to Gather For A Quarterly Report Card
With an ocean of data at your fingertips, it’s best to determine the metrics that will best support your strategy, and any budget
Read More
3 Ways to Protect Hospital Data from Email Spoofing Attacks
Picture this: you are a first-year nurse with an unusual case that you and your colleagues have never seen at your hospital. To expedite the formulation of a treatment plan, you turn to a private Facebook group for nurses to which you belong. Since joining the 8,000-person closed group, you’ve witnessed your peers share information - with important details withheld - as to not break privacy laws, but as a means to generate group think on analysis and recommendations. You’ve seen first-hand how
Read More
Why It’s Time for Hospitals to Become Immune to Ransomware
Editor's Note: Greg Maudsley is a cyber security expert at Menlo Security, a Silicon Valley-based cyber security company that protects organizations from cyber attack by eliminating the threat of malware.Hospitals and other healthcare organizations (HCOs) are increasingly singled out by cyber criminals for ransomware and other attacks. Not only are patients’ sensitive records being targeted, but also – as the FBI warns – their intellectual property or credit card information. The
Read More