Back To All Posts

Filtered by: 'Security'

Critical Condition: How Healthcare Can Navigate the Cybersecurity Crossfire

Healthcare organizations are under siege, targeted relentlessly by cybercriminals seeking to exploit the high value of patient data and the vulnerabilities created by increasingly interconnected systems. Staying ahead of these threats requires ... Read more
| Author Liz White, tagged in Security

Healthcare Cloud Security: A Guide to Getting Started

The healthcare sector consistently ranks among the most frequently targeted industries for cyberattacks. Why are healthcare organizations such frequent targets? Cybercriminals know where the money is: Health records sell for up to 10x more than any ... Read more
| Author Josh Ray, tagged in Security

Health IT Security: The Biggest Threats and How to Mitigate Them

Cyberattacks on healthcare organizations continue to rise. Providers, payers, and other healthcare organizations are prime targets for cybercriminals who are looking to hold sensitive patient data hostage or steal it to commit further criminal acts. ... Read more
| Author Josh Ray, tagged in Security

Securing Patient Data: How to Protect Electronic Health Records

The move to electronic health records (EHRs) over the past few decades has helped to boost operational efficiency in the healthcare industry while improving the speed and quality of care. With electronic records, healthcare organizations are better ... Read more
| Author Kate Wang, tagged in Security

Healthcare Information Security Challenges and Solutions

Protecting patient information is vital for all healthcare organizations. This information—contained in electronic health record (EHR) systems, clinical decision support systems, radiology systems, and other environments—is critical for delivering ... Read more
| Author Kate Wang, tagged in Security

Defense-in-Depth Security: Overview and Implementation Guide

As cyber threats are constantly evolving and becoming more sophisticated, a robust and multi-layered security approach is essential. One such approach is the Defense in Depth (DiD) strategy, which leverages multiple layers of security controls and ... Read more
| Author Josh Ray, tagged in Security

Geisinger Faces Data Breach Affecting 1.2M Patients

Geisinger Health Systems, a Pennsylvania-based hospital, recently suffered a massive breach. Now, they are facing multiple class action lawsuits. ... Read more
| Author Abby Grifno, tagged in News, Security

Healthcare Cybersecurity Trends: What to Expect in Q3 and Q4

This year has shown some unique challenges in the healthcare sphere–from massive attacks to new malicious strategies and more. Keep reading for a mid-year recap and what you can expect for the rest of the year. ... Read more
| Author Abby Grifno, tagged in News, Security

Data Protection in Healthcare: Best Practices and Regulations

For healthcare organizations, protecting sensitive patient data is critical for avoiding financial losses, operational disruptions, and regulatory fines—while also shielding patients from identity theft and fraud. But organizations must balance ... Read more
| Author Kate Wang, tagged in Security

Minnesota Cyber Attack Impacts Over 500,000 Patients

A Minnesota-based radiology service recently released a notice to impacted patients about a cyberattack. ... Read more
| Author Abby Grifno, tagged in News, Security

Subscribe Today

Healthcare technology is moving fast. Don’t miss a thing.

Subscribe Today

New call-to-action