Ransomware, digital transformation, and data control headline this week’s digest of health care cyber security articles.
Thanks for checking out the biweekly digest of helpful health care cyber security articles. We have started breaking this into 2 posts – general Identity Management (published on Thursday) and Healthcare.
Peruse our resources for webinars, case studies, infographics, and educational videos. You can subscribe to receive the biweekly dose of helpful Healthcare Cybersecurity Articles, delivered Tuesdays at 8 PM ET.
5 Health Care Cyber Security Articles, December 2020
Four Easy Steps for Organizations to Hand Over Data Control via HelpNetSecurity
The shift to remote healthcare has also impacted the roll out of new regulations that would give patients secure and free access to their health data. The shift to online services shines a light on a major cybersecurity issue within all industries (but especially healthcare where people have zero control over their data): consent.
How Cybersecurity Supports Digital Transformation in Health Care via SCMagazine
As health care organizations roll out telemedicine, there’s greater access to remote data because of an increase in online consultations. Sensitive data such as PHI can fetch criminals large sums of money on the dark web. R&D efforts such as COVID-19 vaccine development are easy and valuable targets.
Elon Musk’s Starlink May Potentially Revolutionize Healthcare via Forbes
If Starlink is able to viably, sustainably, and safely scale this technology across the globe, its potential impact on healthcare will be an unprecedented paradigm shift.
Raising Defenses Against Ransomware in Healthcare via HelpNetSecurity
Despite some initial misgivings about targeting life-saving organizations expressed by the denizens of cybercrime-oriented underground forums, the healthcare sector has, in the intervening years, become ransomware gangs’ target of choice.
Common Identity Management Acronyms via Idenhaus
It can be a challenge to keep up with all of the Identity Management acronyms floating around. We’ve compiled 50+ of the most commonly used acronyms along with what they represent.
Check out our previous digest of helpful healthcare cybersecurity articles, 7 Must-Read Healthcare Cyber Security Articles.
Subscribe to our biweekly Healthcare IAM and Cybersecurity Digest.
Follow @Idenhaus on Twitter and subscribe to our YouTube channel.
Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us