Internet of Medical Things (IoMT) security, ransomware, and telehealth headline this week’s Healthcare Identity Management and Cybersecurity news digest.
Thanks for checking out the biweekly Idenhaus Healthcare Identity Management and Cybersecurity roundup. We have started breaking this digest into 2 verticals – general Identity Management (published on Thursday) and Healthcare Identity Management and Cybersecurity. Peruse our resources section for webinars, case studies, infographics, and educational videos.
Subscribe to our biweekly Healthcare Cybersecurity and IAM Digest, delivered Tuesdays at 8 PM ET.
13 Healthcare Identity Management and Cybersecurity Articles
Medical Device Cybersecurity in the Age of IoMT via MedTechIntelligence
A recent survey found that 82% of healthcare organizations have experienced an IoT-focused cyberattack in the last year, with 30% of attacks resulting in compromised end-user safety.
COVID-19 unveiled a greater perspective on people, process and technology because it overhauled how the healthcare industry will provide services to partners, employees and patients.
Ransomware Attacks in Healthcare: Are We Seeing a Surge? via GovInfoSecurity
Four recent cybersecurity incidents that may have involved ransomware demonstrate the ongoing threats facing the sector during the COVID-19 pandemic.
By building security controls and policies into every device, medical manufacturers can not only prevent attacks that originate over the Internet, but also ensure that their equipment is not carrying a hidden malware payload injected during the manufacturing process.
3 Key Ways to Bolster Healthcare Cybersecurity with MFA, Training via HealthITSecurity
Healthcare struggles with a lack of resources and staff, as well as a reliance on legacy technologies, which can be strengthened through effective training and security tools like MFA.
Ground telehealth applications in security now via SearchHealthIT
A recent software error at telehealth services provider Babylon Health is a stark reminder for healthcare CIOs to keep telehealth security and privacy top of mind.
Key cause of cyber loss identified in new report via InsuranceBusinessMag
Businesses must be wary of an increase in ransomware attacks and business email compromise (BEC), which were the two most impactful cyber threats in 2019 in terms of both business disruption and monetary loss.
Inadequate Security, Policies Led to LifeLabs Data Breach of 15M Patients via HealthITSecurity
An audit into LifeLab’s 2019 massive data breach by B.C. and Ontario privacy commissioners found the testing giant collected more PHI than necessary and lacked adequate security policies and procedures to protect patient data.
Top 3 Digital Healthcare Trends via HealthcareTechOutlook
Digital healthcare is revamping the face of medicine. The driving factor behind new digital trends is millennials. They are generally dissatisfied with traditional models of health care and prefer greater access to digital healthcare.
Many healthcare institutions are looking for a solution that not only protects their infrastructure but also to support the best patient care possible, business outcomes, enhanced user experiences, and quality-of-life improvements.
Effective Cybersecurity in Hospitals During #COVID19 and Beyond via InfoSecurity Magazine
Having a staff well-versed on best cybersecurity practices and the policies of individual institutions, fully immersed in the steps that must be taken to protect systems, and ultimately patients, is critical to effective cybersecurity, regardless of how good the policies and technologies are.
Side Effects: Cybersecurity and Medical Device Recalls via MedTechIntelligence
There may be cases when a software patch isn’t sufficient to remedy the problem. If the potential risk to the patient is high, the issue may result in a recall—one that requires following each step of the recall lifecycle, from notification to product processing through final close out with the FDA.
What is Policy Based Access Control (PBAC)? via Idenhaus
PBAC solutions address the need to model security requirements, dynamically provision and configure security services, link operational security events to vulnerabilities, and impact assessments at the business level. The end goal is effective risk management because the likelihood of a successful attack increases as a user’s access increases.
Check out our previous digest of Healthcare Identity Management and Cybersecurity articles, 10 Healthcare Identity and Cybersecurity Articles, June 2020
To receive the top Cybersecurity and Identity Access Management articles in your inbox every two weeks (Tuesdays 8 PM ET), subscribe to our biweekly Healthcare Cybersecurity and IAM Digest.
Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us