Happy Memorial Day! Idenhaus highlighted some healthcare heroes for Nurses’ week in May, and now we want to highlight how thankful we are to all those who have served in the military, no matter how they served. For all those still serving, we thank you as well.
In this edition, we explore why some of the hottest cybercrime is happening in the healthcare sector, and why. What’s so hot about healthcare, aside from all that data, data, data? We also explore the FDA’s new advice on medical device development, and some of the common phishing techniques that (still) work on healthcare providers. All this and more in the Idenhaus Healthcare Cybersecurity Newsletter.
Thank you for checking out our biweekly digest of articles for healthcare IAM professionals. We try to curate articles of interest for you, and would love to hear your feedback! Leave us a comment to tell us which article was the most help to you.
Want to know more about IAM for healthcare, or in general? Peruse our resources section for webinars, infographics, and educational videos. Keep your inbox feed fresh for summer, and keep the articles coming all year round. Subscribe to receive the biweekly dose of helpful Healthcare Cybersecurity Articles, delivered Tuesdays at 8 PM ET.
Keeping Us Safe: A Big Thank You To All Who Have Served
Cybercriminals are attracted by healthcare’s large attack surface, one filled with sharing vast amounts of sensitive, time-critical information over largely aging and incohesive systems. Despite the risks, healthcare managers are balking at the necessary reporting of cyber breaches.
Shadow Code, Third-Party Scripts Pose Healthcare Cybersecurity Risks via HealthITSecurity
Third-party scripts can enable enhanced functionality, but a new report suggests that these scripts may also introduce shadow code and healthcare cybersecurity risks. How can you avoid those risks? Talk to Idenhaus today to better shore up your security plans, to avoid those sort of healthcare tech and medical device risks.
The new draft guidance on premarket submissions incorporates quality system regulations and doubles down on a life-cycle approach to product security. Instead of finalizing their 2018 premarket cybersecurity draft guidance, the FDA has decided to issue a new 2022 version to reflect the rapid evolution of cybersecurity, incorporating a new set of quality system regulations (QSRs) with significant changes to its 2018 predecessor.
Common Types of Social Engineering, Phishing Attacks in Healthcare via HealthITSecurity
Social engineering attacks remain some of the most efficient and effective ways for threat actors to exploit victims and gain network access, and the healthcare sector is no exception. Baiting, tailgating, and pretexting are all popular social engineering attacks. But in healthcare, phishing and its sub-categories are dominant.
Last time, we brought to light some data quality issues that are affecting all aspects of the organization. You probably asked yourself, “Wait, our poor data quality is affecting our security posture, as well as our profit margin?” The short answer: yes, yes it is. Come check it out here.
To receive the top Cybersecurity articles for Identity Management Professionals in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us.