10 Healthcare Cybersecurity Articles, November 2020

Ransomware, Compliance, and Zero Trust headline this week’s digest of healthcare cybersecurity articles.

Healthcare Cybersecurity Articles, November 2020

Thanks for checking out the biweekly digest of helpful healthcare cybersecurity articles. We have started breaking this into 2 posts – general Identity Management (published on Thursday) and Healthcare cybersecurity articles.

Peruse our resources for webinars, case studies, infographics, and educational videos. You can subscribe to receive the biweekly dose of helpful Healthcare Cybersecurity Articles, delivered Tuesdays at 8 PM ET.

business email compromise

10 Healthcare Cybersecurity Articles, November 2020

 

3 Key Considerations for Your Healthcare IAM Roadmap via Idenhaus

Learn how a Healthcare IAM Roadmap can set your organization on the path to a successful Identity Management implementation.

 

Why Cyber Risk and Compliance Needs to Be the Foundation for Healthcare Digital Transformation Initiatives via SecurityBoulevard

Using a gold-standard framework like HIPPA or the NIST CSF in tandem with an integrated risk management solution can do wonders to alleviate the stress and resources used when undergoing a digital transformation in healthcare.

 

Closing Healthcare’s Cybersecurity Gaps With Endpoint Security via Forbes

To successfully close the cybersecurity gap in their organizations, healthcare providers need to take a multifaceted strategy to endpoint security, starting by improving endpoint persistence and progressing to geofencing.

 

What Hospitals Should Know About the Ryuk Ransomware Threat via HealthTech Magazine

An onslaught of cyberattacks targeting healthcare data is coming, federal officials warn. Providers are urged to step up their defenses.

 

Ransomware Update: More Data Leaked, NY Health System Recovers via HealthIT Security

UVM Health has progressed in its ransomware recovery efforts, while St. Lawrence Health restored its network. But three entities were not as successful, as hackers leaked more health data.

 

Nominations Open for 2021 Most Influential Women in Health IT Awards via HIMSS

HIMSS is accepting submissions through Dec. 15 for the 2021 Most Influential Women in Health IT Awards. These awards recognize and celebrate influential women who harness the power of information and technology to transform health and healthcare.

 

Hospitals make themselves a target for cyber attacks via TechTarget

In the midst of a pandemic, the last thing healthcare CIOs need is a wave of cyber attacks — but that’s exactly what they might be faced with, and there are reasons why.

 

HHS unveils new 2020-2025 Federal Health IT Strategic Plan via HealthcareIT News

The document describes the government’s hopes for how technology goals should be prioritized over the next five years – with an emphasis on patients’ access to their health data.

 

Analysis: Tactics of Group Waging Attacks on Hospitals via DataBreach Today

Mandiant’s analysis of UNC1878’s methods is based on what it’s observed in the recent hospital attacks and how the group conducted earlier attacks on healthcare facilities.

 

Leveraging Zero Trust with Identity at the Core via Idenhaus

Zero Trust shifts the focus from protecting the corporate network to protecting individual resources. Authentication and authorization become discrete functions that are performed before any access to an enterprise resource is allowed.

 

Check out our previous digest of helpful healthcare cybersecurity articles, 9 Helpful Healthcare Cybersecurity Articles, October 2020.

 

Subscribe to our biweekly Healthcare IAM and Cybersecurity Digest.

 

Follow @Idenhaus on Twitter and subscribe to our YouTube channel

 


Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!


forbes technology council


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top