9 Must-Read Idenhaus Healthcare Cybersecurity Articles, October 2020

idenhaus healthcare cybersecurity

Thanks for checking out the biweekly digest of Idenhaus healthcare cybersecurity resources. We have started breaking this into 2 posts – general Identity Management (published on Thursday) and Healthcare cybersecurity articles.

Peruse our resources for webinars, case studies, infographics, and educational videos. You can subscribe to receive the biweekly Idenhaus Healthcare Cybersecurity Articles, delivered Tuesdays at 8 PM ET.

 

9 Must-Read Idenhaus Healthcare Cybersecurity Articles, October 2020

 

What is Policy Based Access Control (PBAC)? via Idenhaus

Learn how Policy Based Access Control (PBAC) combines semantic security risk management with a dynamic policy framework to mitigate security threats.

 

Blackbaud: Hackers May Have Accessed Banking Details via BankInfoSecurity

Blackbaud admitted in its breach notification that it paid an undisclosed ransom to cybercriminals in exchange for them ensuring that any copies of the data stolen were destroyed.

 

Phishing Attacks in Healthcare: 4 Proven Ways to Prevent a Breach via HealthTech Magazine

More than one-third of health IT staffers don’t conduct phishing tests, despite nearly twice that number (59 percent) citing email as the most common point of compromise, according to the 2019 HIMSS Cybersecurity Survey. Here’s how hospitals can take action to reduce their vulnerability to phishing attacks.

 

So you’ve been hit with a ransomware attack. What now? via HealthcareIT News

Of course, there are a number of ways health systems can protect themselves against ransomware attacks. But what should hospitals and other companies do if cybercriminals do hold their data hostage?

 

Connected medical devices are exposing healthcare systems to cyber-attacks via BeckersHospitalReview

Clinical asset management needs to be a key element of a health system’s cybersecurity management plan because when left unaddressed connected medical devices can expose a health system to a host of threats.

 

Healthcare cybersecurity needs a dose of threat modeling via TechTarget

CISA senior advisor Josh Corman said healthcare CIOs should focus on threat modeling and stronger disaster recovery for better healthcare cybersecurity.

 

DHS CISA Shares Best Practice Ransomware Guide, Telework Toolkit via HealthITSecurity

Two recent releases from DHS CISA detail best practice guidance for ransomware and other threats, as well as a toolkit for transitioning into a secure, permanent telework environment.

 

Why health care must prioritise data protection via HospitalHealth

It is crucial for healthcare organizations and businesses to take a unified approach to data security and ensure the protection of valuable information at a time when access is vital. The establishment of these security measures is a tricky balancing act, especially if they’re built on outdated infrastructure.

 

Why Workarounds are IAM’s Silent Killer via Idenhaus

When it comes to Identity & Access Management, the fewer workarounds your organization has, the more mature your IAM program. Here is why workarounds are a key indicator of the maturity of your IAM solution.

 

Check out our previous Idenhaus healthcare digest, 7 Must-Read Healthcare Cyber Security Articles, September 2020.

 

To receive the top Cybersecurity and Identity Access Management articles in your inbox every two weeks (Tuesdays 8 PM ET), subscribe to our biweekly Idenhaus Healthcare IAM and Cybersecurity Digest.

 

Follow @Idenhaus on Twitter and subscribe to our YouTube channel

 


Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!


forbes technology council


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top