7 Cybersecurity Articles for Healthcare and IAM Professionals

What better way to stay fresh this summer than a round of Idenhaus cybersecurity updates? We explore another of the common pre-breach mistakes organizations make, the changing rules and regulations for medical devices and more for this week’s digest of articles for Healthcare IAM professionals.

Thank you for checking out our biweekly digest of articles for healthcare IAM professionals. We try to curate articles of interest for you, and would love to hear your feedback! Leave us a comment to tell us which article was the most help to you. 

Want to know more about IAM for healthcare, or in general? Peruse our resources section for webinars, infographics, and educational videos. Keep your inbox feed fresh for summer, and keep the articles coming all year round. Subscribe to receive the biweekly dose of helpful Healthcare Cybersecurity Articles, delivered Tuesdays at 8 PM ET.

Cyber Security Articles for Healthcare IAM Professionals

 

Pre-Breach Mistakes That Organizations Make With Cyber Security via Idenhaus

Join us as we talk about the third mistake of our five: talking up your cyber security, and not putting those talking points into action. Just because you say your organization is secure doesn’t mean you are totally secure. Find out how to avoid this mistake, and how to move forward with a better plan.

Cybercriminals Target Internet-Connected Medical Devices via HealthcareITNews

As hackers target internet connected devices, researchers race to find vulnerabilities and fix them before bad actors can make off with patient data. From these small steps will come the new standards of IoT devices, for the medical device sector and beyond.

Renewed Focus on Cybersecurity May Have Significant Impacts on Previously Shielded Healthcare Companies via JDSUPRA Online

The FDA acknowledges that “cybersecurity is crucial for medical device safety and effectiveness.” However, it is important to recognize that currently, the FDA’s ability to regulate cybersecurity extends only to medical devices. This is something to watch, as it will change as quickly as the technology changes.

Secure by Design: Developing Cybersecure Medical Devices via Medical Economics

The current standards for Medical Devices connected to the Internet are being reviewed to help keep patients’ information secure from the first steps of the design process through to the last regulatory check-offs. How will this affect the future of medical devices and IoT?

House Passes Several New Bipartisan Cybersecurity Bills via HealthcareIT News

Four pieces of legislation were among more than a dozen homeland security bills passed by the House this week. The State and Local Cybersecurity Improvement Act (HR 3138); The Cybersecurity Vulnerability Remediation Act (HR 2980); The CISA Cyber Exercise Act (HR 3233); The DHS Industrial Control Systems Capabilities Enhancement Act of 2021 (HR 1833).

HHS Warns Health Systems of PACS Security Vulnerabilities via Med-TechNews

The agency says the DICOM standard used by picture archiving communication systems is open to exploitation when connected to the Internet, and that providers should act now to patch at-risk PACS.

Data Breach Impacts Patients, Employees of Dermatology Practice via HealthITSecurity

The data breach may have included Forefront Dermatology patients’ names, addresses, dates of birth, patient account numbers, health insurance plan member ID numbers, medical record numbers, dates of service, accession numbers, provider names, and/or medical and clinical treatment information.

Check out our previous digest of articles for healthcare cybersecurity professionals, Fresh For Summer: Articles for Healthcare IAM Professionals

 

Subscribe to our biweekly Healthcare IAM and Cybersecurity Digest.

 

Follow @Idenhaus on Twitter and subscribe to our YouTube channel

 

forbes technology council


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top