Thank you for checking out our biweekly digest of articles for healthcare IAM professionals. We try to curate articles of interest for you, and would love to hear your feedback! Leave us a comment to tell us which article was the most help to you.
Want to know more about IAM for healthcare, or in general? Peruse our resources section for webinars, infographics, and educational videos. Keep your inbox feed fresh for summer, and keep the articles coming all year round. Subscribe to receive the biweekly dose of helpful Healthcare Cybersecurity Articles, delivered Tuesdays at 8 PM ET.
Securing the Internet of Medical Things via HealthTech Magazine
The “black box” nature of most connected gear in a healthcare setting has made securing IoMT devices against threats increasingly difficult. The basic requirement is isolation: separating each device as much as possible from others, which can become operationally impossible for larger hospitals or smaller IT teams. How can we address the issue? Check it out here.
CSA Issues Guidance on Third-Party Risk Management in Healthcare via HealthITSecurity
Proper third-party risk management strategies are crucial to maintaining healthcare cybersecurity as cyber threats continue to grow. Threat actors are increasingly using third-party business associates as easier entry points into customer networks. Once inside the network, the malicious hackers may be able to access sensitive health data, encrypt files, and deploy ransomware on organizations that the associate does business with. Talk to Idenhaus today if you’re in need of help mitigating those cyber risks.
NIST Updates Guidance for Health Care Cybersecurity via Homeland Security Today
NIST has developed the revision to integrate it with other NIST cybersecurity guidance that did not exist when Revision 1 was published in 2008. What are the revisions, and how long are they accepting comments before the revisions become codified? Let’s check it out here.
Experts See Cyber Threats Intensifying—and a Need to Reduce Friction for Staff via Healthcare Innovation
At Healthcare Innovation’s Texas Summit, held last week in Houston, cybersecurity experts emphasized the need to try to reduce friction for health system staff members, even while moving forward. The experts agreed: there’s no question whatsoever that threats to the data contained in patient care organizations’ information systems are intensifying now. How does that affect your healthcare operations?
Attack Surface Management via Idenhaus
Do you have 100% of your organization’s attack surface inventoried? While it may seem like a Sisyphus-level task to keep up with attack vectors today, the reality of the matter is that you have to keep up with them, or the threat actors will find a way into your best laid cybersecurity plans. Don’t let it happen to you! Talk to Idenhaus’ experts today!
To receive the top Cybersecurity articles for Identity Management Professionals in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us.