13 Healthcare Identity Management and Cybersecurity Articles

Share on linkedin
Share on twitter
Share on facebook

Internet of Medical Things (IoMT) security, ransomware, and telehealth headline this week’s Healthcare Identity Management and Cybersecurity news digest. 

healthcare identity management and cybersecurity

Thanks for checking out the biweekly Idenhaus Healthcare Identity Management and Cybersecurity roundup. We have started breaking this digest into 2 verticals – general Identity Management (published on Thursday) and Healthcare Identity Management and Cybersecurity. Peruse our resources section for webinars, case studies, infographics, and educational videos.

Subscribe to our biweekly Healthcare Cybersecurity and IAM Digest, delivered Tuesdays at 8 PM ET.

Learning about Policy Based Access Control (PBAC) Webinar

13 Healthcare Identity Management and Cybersecurity Articles

 

Medical Device Cybersecurity in the Age of IoMT via MedTechIntelligence

A recent survey found that 82% of healthcare organizations have experienced an IoT-focused cyberattack in the last year, with 30% of attacks resulting in compromised end-user safety.

 

3 healthcare CISOs tackled telehealth at hyper speed — they wish they were faster via CIODive

COVID-19 unveiled a greater perspective on people, process and technology because it overhauled how the healthcare industry will provide services to partners, employees and patients.

 

Ransomware Attacks in Healthcare: Are We Seeing a Surge? via GovInfoSecurity

Four recent cybersecurity incidents that may have involved ransomware demonstrate the ongoing threats facing the sector during the COVID-19 pandemic.

 

Keeping medical devices safe from Cyber attacks via EPT

By building security controls and policies into every device, medical manufacturers can not only prevent attacks that originate over the Internet, but also ensure that their equipment is not carrying a hidden malware payload injected during the manufacturing process.

 

3 Key Ways to Bolster Healthcare Cybersecurity with MFA, Training via HealthITSecurity

Healthcare struggles with a lack of resources and staff, as well as a reliance on legacy technologies, which can be strengthened through effective training and security tools like MFA.

 

Ground telehealth applications in security now via SearchHealthIT

A recent software error at telehealth services provider Babylon Health is a stark reminder for healthcare CIOs to keep telehealth security and privacy top of mind.

 

Key cause of cyber loss identified in new report via InsuranceBusinessMag

Businesses must be wary of an increase in ransomware attacks and business email compromise (BEC), which were the two most impactful cyber threats in 2019 in terms of both business disruption and monetary loss.

 

Inadequate Security, Policies Led to LifeLabs Data Breach of 15M Patients via HealthITSecurity

An audit into LifeLab’s 2019 massive data breach by B.C. and Ontario privacy commissioners found the testing giant collected more PHI than necessary and lacked adequate security policies and procedures to protect patient data.

 

Top 3 Digital Healthcare Trends via HealthcareTechOutlook

Digital healthcare is revamping the face of medicine. The driving factor behind new digital trends is millennials. They are generally dissatisfied with traditional models of health care and prefer greater access to digital healthcare.

 

Tackling the Cybersecurity Challenges Within the Healthcare Industry via CSOOnline

Many healthcare institutions are looking for a solution that not only protects their infrastructure but also to support the best patient care possible, business outcomes, enhanced user experiences, and quality-of-life improvements.

 

Effective Cybersecurity in Hospitals During #COVID19 and Beyond via InfoSecurity Magazine

Having a staff well-versed on best cybersecurity practices and the policies of individual institutions, fully immersed in the steps that must be taken to protect systems, and ultimately patients, is critical to effective cybersecurity, regardless of how good the policies and technologies are.

 

Side Effects: Cybersecurity and Medical Device Recalls via MedTechIntelligence

There may be cases when a software patch isn’t sufficient to remedy the problem. If the potential risk to the patient is high, the issue may result in a recall—one that requires following each step of the recall lifecycle, from notification to product processing through final close out with the FDA.

 

What is Policy Based Access Control (PBAC)? via Idenhaus

PBAC solutions address the need to model security requirements, dynamically provision and configure security services, link operational security events to vulnerabilities, and impact assessments at the business level. The end goal is effective risk management because the likelihood of a successful attack increases as a user’s access increases.

 

Check out our previous digest of Healthcare Identity Management and Cybersecurity articles, 10 Healthcare Identity and Cybersecurity Articles, June 2020

 

To receive the top Cybersecurity and Identity Access Management articles in your inbox every two weeks (Tuesdays 8 PM ET), subscribe to our biweekly Healthcare Cybersecurity and IAM Digest.

 

Follow @Idenhaus on Twitter and subscribe to our YouTube channel

 

 


Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!


forbes technology council


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *

About Idenhaus

Idenhaus is an award-winning Identity Management and Cybersecurity services firm based in Atlanta, GA.

Follow Us

Recent Posts

Newsletter Signup



top 25 iam blog idenhaus

Why You Need An IAM Roadmap

Scroll to Top