Menu

Blogs

Showing Blog Posts: 1–8 of 8 tagged Healthcare

  • From Top to Bottom, State of Cyber Security in Healthcare is a National Concern

    by Tony Kontzer on June 28, 2018

    Given the sensitive nature of healthcare information, and the fact that we have an overarching regulation, HIPAA, that dictates how that data is handled, it would seem safe to assume that cyber security has been established as an ongoing top priority. Yeah, well, about that…it seems that healthcare continues to lag behind most other industries in securing its data, hampered by non-action that…

  • HIPAA, GDPR and the Dreaded “Second Hop” Security Problem

    by Salvatore J. Stolfo on June 18, 2018

    Malicious attacks targeting a healthcare company’s confidential data are nothing new. The industry has lived under the stringent HIPAA requirements for years and many have made great strides deploying systems to manage and protect their data. What is disturbing, however, is the number of breaches that still occur. A recent example: LifeBridge is just now disclosing a breach that happened in…

  • Human Threats Facing Healthcare Organizations

    by Steven Grossman on March 22, 2018

    Healthcare organizations have an obligation to safeguard electronic protected health information (ePHI), whether it’s due to government mandates or to build trust among patients. If they fail to meet this obligation, the penalties can be steep. Between data loss costs and regulatory fines, healthcare organizations are losing millions from data breaches. A recent study by the Ponemon Institute, …

  • Ben's Book of the Month: Review of "How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It!"

    by Ben Rothke on November 30, 2017

    This month’s theme is security strategy & operations. Some questions include: what makes a good cybersecurity strategy? What policies and procedures should you have in place to ensure your employees, customers and sensitive data remain safe? If you believe John Trinckes in How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It! (Auerbach Publications 978-1498783958), the…

  • Internal and External Forces Mean Healthcare Security Has to Adapt

    by James Christiansen on July 13, 2017

    The complexity of healthcare information security grows daily. Paper records are long gone. With more than 700 security technologies to consider, millions of threat actors to detect and new attack vectors to defend against, simply working harder will not solve the problem. Healthcare is a prime target for hackers due to the vast amounts of private health information (PHI) and the pure complexity…

  • Healthcare Industry Finds Itself Falling Behind on Data Security Front

    by Tony Kontzer on April 28, 2017

    With the healthcare industry having put so much energy in recent years to the transition to electronic healthcare, and to protecting patient privacy through regulations like the U.S.'s Healthcare Insurance Portability and Accountability Act (HIPAA), one would assume the sector has been addressing security sufficiently. That would be a dangerous assumption. Recent events haven't just highlighted…

  • Ben's Book of the Month: Review of "Hospital and Healthcare Security"

    by Ben Rothke on February 28, 2017

    When I first requested a copy of Hospital and Healthcare Security (Butterworth-Heinemann 012-4200486), I assumed it was brief high-level reference on the topic. Upon getting this monster of a book, I read as Tom Smith wrote in the forward, “this is the bible of healthcare security”. At just over 700 pages, the book is indeed a comprehensive reference for everything related to hospital and…

  • 2017 Security Threats for Healthcare

    by John Humphreys on February 23, 2017

    From the Bon Secours Health System data breach impacting nearly 700,000 individuals to the $17,000 in ransom that Hollywood Presbyterian Medical Center paid hackers, 2016 wasn’t the best year for healthcare security. So what’s in store for 2017? The healthcare industry is always going to be a target for hackers, yet security continues to be a challenge due to the overwhelming volume of security…

View All

 

Are you interested in contributing to the RSA Conference blog? Download our 2018 & 2019 Editorial Calendars for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 19 Nov 2018 18:52:53 -0500.