Securing The Internet of Medical Things, Updated Guidance for Healthcare Cybersecurity and More

Share on linkedin
Share on twitter
Share on facebook

 

Thank you for checking out our biweekly digest of articles for healthcare IAM professionals. We try to curate articles of interest for you, and would love to hear your feedback! Leave us a comment to tell us which article was the most help to you.

Want to know more about IAM for healthcare, or in general? Peruse our resources section for webinars, infographics, and educational videos. Keep your inbox feed fresh for summer, and keep the articles coming all year round. Subscribe to receive the biweekly dose of helpful Healthcare Cybersecurity Articles, delivered Tuesdays at 8 PM ET.


Securing the Internet of Medical Things via HealthTech Magazine

The “black box” nature of most connected gear in a healthcare setting has made securing IoMT devices against threats increasingly difficult. The basic requirement is isolation: separating each device as much as possible from others, which can become operationally impossible for larger hospitals or smaller IT teams. How can we address the issue? Check it out here.

CSA Issues Guidance on Third-Party Risk Management in Healthcare via HealthITSecurity

Proper third-party risk management strategies are crucial to maintaining healthcare cybersecurity as cyber threats continue to grow. Threat actors are increasingly using third-party business associates as easier entry points into customer networks. Once inside the network, the malicious hackers may be able to access sensitive health data, encrypt files, and deploy ransomware on organizations that the associate does business with. Talk to Idenhaus today if you’re in need of help mitigating those cyber risks.

NIST Updates Guidance for Health Care Cybersecurity via Homeland Security Today

NIST has developed the revision to integrate it with other NIST cybersecurity guidance that did not exist when Revision 1 was published in 2008. What are the revisions, and how long are they accepting comments before the revisions become codified? Let’s check it out here.

Experts See Cyber Threats Intensifying—and a Need to Reduce Friction for Staff  via Healthcare Innovation

At Healthcare Innovation’s Texas Summit, held last week in Houston, cybersecurity experts emphasized the need to try to reduce friction for health system staff members, even while moving forward. The experts agreed: there’s no question whatsoever that threats to the data contained in patient care organizations’ information systems are intensifying now. How does that affect your healthcare operations?

Attack Surface Management via Idenhaus

Do you have 100% of your organization’s attack surface inventoried? While it may seem like a Sisyphus-level task to keep up with attack vectors today, the reality of the matter is that you have to keep up with them, or the threat actors will find a way into your best laid cybersecurity plans. Don’t let it happen to you! Talk to Idenhaus’ experts today!


To receive the top Cybersecurity articles for Identity Management Professionals in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.

Follow @Idenhaus on Twitter and subscribe to our YouTube channel. Don’t forget to peruse our resources for webinarscase studies, infographics, and educational videos.

By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us.

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published.

Scroll to Top