6 Powerful Articles About Healthcare Technology for Healthcare IAM Professionals

Share on linkedin
Share on twitter
Share on facebook

Ransomware, hackers targeting healthcare technology, and more in this week’s digest of articles for Healthcare IAM professionals.

6 Powerful Articles for Healthcare IAM Professionals

Thanks for checking out the biweekly digest of articles for healthcare IAM professionals. 

Peruse our resources section for webinars, infographics, and educational videos. You can subscribe to receive the biweekly dose of helpful Healthcare Cybersecurity Articles, delivered Tuesdays at 8 PM ET.

6 Powerful Articles for Healthcare IAM Professionals, May 2021

 

Healthcare’s Email Problem: Insider Threats, Data Retention, Phishing via HealthITSecurity

Email is a crucial communication tool, but as insider threats remain the biggest risk, healthcare must address key problem areas like data retention and phishing defenses to reduce risks.

 

Ransomware: How The NHS Learned The Lessons of WannaCry To Protect Hospitals From Attack via ZDNet

To protect networks from ransomware attacks, the NHS has learned the lessons from WannaCry and is aiming to ensure that it’s harder for cyber criminals to exploit vulnerabilities in order to distribute malware.

 

Cloud Data And Security — What Every Healthcare Technology Leader Needs To Know via InformationAge

With most healthcare organizations continuing to digitize services and increasingly move workloads to the cloud, any healthcare technology leader must prioritize cloud data and security in this expanding virtual environment.

 

Hacking Attempts On Healthcare Agencies Increased By More Than 9,800% in 2020 via EMS1

A recent report estimates that health care customers experienced a 9,851% increase in hacking attempts in 2020 compared to the previous year – activity that intensified with the COVID-19 pandemic.

 

Healthcare IoT, Devices Most Impacted by TCP/IP Vulnerabilities via HealthITSecurity

Healthcare technology experts ongoing TCP/IP vulnerability research shows that IoT and medical devices in healthcare face the greatest risk of exposure and attack.

 

Stay Ahead of Hackers with User Access Reviews – Part 2 via Idenhaus

Access Reviews are critical to prioritizing employee education and awareness as the first line of defense; they should be integrated into an organization’s security strategy.

 

Check out our previous digest of articles for healthcare cybersecurity professionals, 7 Must-Read Articles for Healthcare IAM Professionals

 

Subscribe to our biweekly Healthcare IAM and Cybersecurity Digest.

 

Follow @Idenhaus on Twitter and subscribe to our YouTube channel

 

forbes technology council


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top