IT leaders must plan meticulously, train employees thoroughly and strike the right balance between software and services to shore up health care security.
The HIPAA settlements from 2016 reinforce the importance of risk analysis when creating policies and procedures to protect PHI.
Upon reviewing the state of health care security in 2016, data revealed that the sector suffered nearly every type of common attack at an increased rate.
Health care companies must review every business associate agreement to ensure that it aligns with HIPAA requirements and that PHI is properly secured.
When donors finish giving blood, they’re often handed some sweet treats, like cookies or juice, to help get them back to full strength. But for the Australian Red Cross, the end of October 2016 comes with not-so-funny tricks along with those...
Cybercriminals prefer the easy way in, like a server with default username/password combinations or a software flaw. In the case of the Guilford County, North Carolina Emergency Medical Services (EMS) Department, the open Rsync server that manages...
Many cybercriminals have turned to ransomware as a cheaper, simpler alternative to traditional methods of stealing medical records.
Children's hospitals often fall victim to black market identity theft because their primary goal is treating patients — data security is secondary.
The future of the health care industry could lie in quantum security: This advanced technology has the potential to secure critical data efficiently.
Predictions for health care security in 2016 were grim. What can we learn about the industry and its risks at this midyear checkup?