Ransomware, privacy legislation, and health IT trends headline this digest of Healthcare Cyber Security Articles.
Thanks for checking out the biweekly Idenhaus Healthcare Cyber Security articles. We have started breaking this digest into 2 verticals – general Identity Management (published on Thursday) and Healthcare IAM and Cybersecurity.
10 Healthcare Cyber Security Articles
U.S. health care is highly fragmented, multidisciplinary and compartmentalized — and so is its technological infrastructure, which runs the gamut from circa-2010 PACS radiology systems to IoT-enabled ventilators.
Combating The Ransomware Threat via American Healthcare Journal
Given the rising ransomware and blended threats, it is vital that hospitals, labs and medical centers re-examine their readiness to fend off cyberattacks. Here are eight proactive steps and precautions that can reduce the chances that your company will become a ransomware victim.
Take IT out of its silo. Borrowing from noncurrent engineering, adopt a collaborative working model where all stakeholders are involved in the development and deployment of solutions to improve outcomes.
Fraudulent HIPAA Communications: An Alert from the Office for Civil Rights via National Law Review
OCR states that it became “aware of postcards being sent to health care organizations disguised as official OCR communications, claiming to be notices of a mandatory HIPAA compliance risk assessment.”
National Biometric Information Privacy Act, Proposed by Sens. Jeff Merkley and Bernie Sanders via National Law Review
The Act would grant individuals the right to request certain information about biometric identifiers or biometric information collected by a covered entity within the preceding 12-month period.
The most dangerous health IT trends: Insights from 8 execs via Becker’s Hospital Review
The pandemic gave rise to new cybersecurity threats for health systems, which will require additional investment. Here, eight IT executives outline the most dangerous trends they’re seeing in health IT today.
The New York State Department of Financial Services (NYDFS) recently filed its first cybersecurity enforcement action. This enforcement action shows the importance of mitigating legal risks when addressing cybersecurity risks.
Keep an eye on the ‘canary in the coal mine.’ Technology laggards are slow to adopt, resist innovation, are skeptical and are generally price-sensitive. These traits make them the “canary in a coal mine,” letting you know that your technology—which started as a novelty—is rapidly becoming a commodity.
Addressing security challenges presented by HIEs via Healthcare IT News
Panelists at the ONC Tech Forum on Monday advised mapping the functions of health information exchanges to “confidentiality, integrity and availability.”
What is the California Privacy Rights Act (CPRA)? via Idenhaus
CPRA builds on CCPA, in that it would give California residents more control over their personal information on a number of fronts and create a more detailed privacy framework for businesses.
Check out the previous Healthcare Cybersecurity news digest, 8 Insightful Healthcare Cybersecurity News Articles.
To receive the top Cybersecurity and Identity Access Management articles in your inbox every two weeks (Tuesdays 8 PM ET), subscribe to our biweekly Healthcare IAM and Cybersecurity Digest.
Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us