5 Health Care Cyber Security Articles, December 2020

Share on linkedin
Share on twitter
Share on facebook

Ransomware, digital transformation, and data control headline this week’s digest of health care cyber security articles.

5 Health Care Cyber Security Articles, December 2020

Thanks for checking out the biweekly digest of helpful health care cyber security articles. We have started breaking this into 2 posts – general Identity Management (published on Thursday) and Healthcare.

Peruse our resources for webinars, case studies, infographics, and educational videos. You can subscribe to receive the biweekly dose of helpful Healthcare Cybersecurity Articles, delivered Tuesdays at 8 PM ET.

 

5 Health Care Cyber Security Articles, December 2020

 

Four Easy Steps for Organizations to Hand Over Data Control via HelpNetSecurity

The shift to remote healthcare has also impacted the roll out of new regulations that would give patients secure and free access to their health data. The shift to online services shines a light on a major cybersecurity issue within all industries (but especially healthcare where people have zero control over their data): consent.

 

How Cybersecurity Supports Digital Transformation in Health Care via SCMagazine

As health care organizations roll out telemedicine, there’s greater access to remote data because of an increase in online consultations. Sensitive data such as PHI can fetch criminals large sums of money on the dark web. R&D efforts such as COVID-19 vaccine development are easy and valuable targets.

 

Elon Musk’s Starlink May Potentially Revolutionize Healthcare via Forbes

If Starlink is able to viably, sustainably, and safely scale this technology across the globe, its potential impact on healthcare will be an unprecedented paradigm shift.

 

Raising Defenses Against Ransomware in Healthcare via HelpNetSecurity

Despite some initial misgivings about targeting life-saving organizations expressed by the denizens of cybercrime-oriented underground forums, the healthcare sector has, in the intervening years, become ransomware gangs’ target of choice.

 

Common Identity Management Acronyms via Idenhaus

It can be a challenge to keep up with all of the Identity Management acronyms floating around. We’ve compiled 50+ of the most commonly used acronyms along with what they represent.

 

Check out our previous digest of helpful healthcare cybersecurity articles, 7 Must-Read Healthcare Cyber Security Articles.

 

Subscribe to our biweekly Healthcare IAM and Cybersecurity Digest.

 

Follow @Idenhaus on Twitter and subscribe to our YouTube channel

 


Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!


forbes technology council


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *

About Idenhaus

Idenhaus is an award-winning Identity Management and Cybersecurity services firm based in Atlanta, GA.

Follow Us

Recent Posts

Newsletter Signup



top 25 iam blog idenhaus

Why You Need An IAM Roadmap

Scroll to Top