A disheartening reality is that cyberattacks targeting healthcare and other critical industries are on the rise, making it more important than ever for organizations to implement thorough security measures. This is where single sign-on (SSO) and multi-factor authentication (MFA) come in. By combining these tools, healthcare organizations can protect themselves...
Category: Blog
Take control of your healthcare security with threat hunting
What is threat hunting? Similar to how early detection and prevention are crucial to maintaining patient health, threat hunting plays a critical role in identifying potential cyber threats and breaches before they occur. Within a Security Operations Center (SOC), threat hunters systematically search through an organization's network, system, and data...
Can a decryption key help you avoid a ransom?
Network security admins all have the same fear - Friday afternoon at about 4:30pm, tech support gets a call that a computer is acting strange with files and folders not working properly. Their response to the call reveals a ransom note! But before you consider paying a ransom for a...
5 Healthcare cybersecurity tips for apps and mobile devices
Every healthcare organization, regardless of the devices used, faces the risk of cybersecurity attacks. However, the use of mobile devices and apps can bring the risk of a cyber-attack to another level. Apps and mobile devices are highly effective, affordable, and convenient ways for medical facilities to manage a diverse...
Hot off the press: the 2023 Horizon Report
In case you missed our press release or the media coverage around it, this week we released the Fortified Health Security 2023 Horizon Report. There are a lot of cybersecurity reports released by many cybersecurity companies, but the Horizon Report is specifically designed around, and for, the healthcare industry and...
Protect yourself and your organization from holiday scams
The holiday season is something many of us look forward to each year. Unfortunately, it’s a “most wonderful time of the year” for bad actors and cyber attackers as well. To help keep you and your team safe, we’ve put together a few tips to protect you from potential cyber...
3 things you should add to your healthcare Vulnerability Threat Management
As we head into the final days of Cybersecurity Awareness Month, one key theme has emerged in our blog series; healthcare organizations have many options available to help combat cyberattacks, and it can become daunting to select which solutions provide the best fit for your organization. Considering integrations and intelligence...
5 Steps to Improve Cybersecurity on Your Connected Medical Devices
Patient care depends on reliable access to medical devices, so hospital staff need to keep an accurate inventory of this equipment. However, since more devices are connected to hospital networks than ever before, there is an increased risk of cyberattacks. This guide will break down some of the ways that...
How the Best Organizations Manage Security Awareness Training Programs
Yawn. I’ve been here for six hours and all I’ve seen so far is someone who cut their finger slicing potatoes and someone who burned themselves trying to fry a turkey. What a lame Thanksgiving. I thought my first time working a holiday at a prestigious hospital would be more...
9 Tricks Spammers Use to Compromise Your System
Today's cybersecurity tools can help stop cybercriminals; however, many spammers find creative ways to get around safeguards. Spammers add another layer of risk to healthcare organizations, so it's important that all employees know how to spot these cybersecurity threats. Here are some of the most common tricks spammers may use...
Should You Build or Buy SOC Operations? Partnering with an MSSP For Network Security
Every organization has unique cyber security risks. You can protect your data from external threats by assessing these risks and creating a security plan. Generally, this process involves either building an internal Security Operations Center (SOC) or partnering with a Managed Security Services Provider (MSSP). What Factors Are Involved with...
Take This Step to Level Up Your Cybersecurity Program
Penetration testing, or pentesting as it’s often called, is one of the fundamental building blocks for a cybersecurity program. Pentesting provides vital information about an organization’s cybersecurity posture and seeks to uncover previously undiscovered vulnerabilities. It also demonstrates the impact of previously known vulnerabilities for more accurate risk assessment. Unfortunately,...
The Next Big Challenge in Healthcare Is Here. Are You Prepared?
Third-Party Risk Management, or TPRM, is a growing concern for healthcare organizations. According to the 2022 Ponemon Industry Report, 63% of respondents stated that while cybersecurity incidents involving third parties are increasing, they feel ineffective at controlling third-party risk. Additionally, 55% of healthcare organizations had experienced a data breach in...
Are You Introducing Risk to Your Organization? Here’s How to Find Out.
The last few years have thrown many curveballs, like Covid, cyberinsurance changes, and a record number of attacks, at healthcare IT and Security teams. During these trying times, many teams were understaffed and resource-constrained, trying to put out daily “fires” and helping maintain efficient patient care. As a result, some...
How to Educate Multiple Generations on Security Risks and Protocols
Healthcare employees are the backbone of daily operations. When interacting with patients and handling ePHI, your employees can make or break your cybersecurity strategy. This is why cybersecurity awareness training and education should be on your priority list. But security awareness training isn’t necessarily a one-size-fits-all approach. Currently four main...
Understanding SIEM, MDR, and XDR
A Guide to Cybersecurity Detection and Response New cybersecurity innovations continue to fill the market each year as organizations attempt to stay ahead of threat actors. The challenge is sifting through all the options to find the solutions that best fit your organization’s needs. While this is not a new...
Can Expertise on-Demand solutions help your cybersecurity staffing challenges?
Strategies for addressing healthcare IT cybersecurity organizational resourcing Finding IT professionals to fill open positions is reaching critical levels for many organizations. In fact, 63% of respondents to an ISACA report shared they had unfilled cybersecurity positions. Almost the same percentage--62%--stated their team was understaffed, taking more than six months...
Four Easy Ways to Protect Yourself Online
October is National Cybersecurity Awareness Month (NCSAM), when government and the private sector work together to develop ways that businesses can help their workers and customers keep their digital data safe. It’s an excellent time for healthcare stakeholders to look at the privacy and security best practices they should employ....
As Cybersecurity Strains Healthcare, the 405(d) Program and Task Group Offers Help
Utilizing Resources like Health Industry Cybersecurity Practices (HICP) to Improve Cybersecurity in Healthcare from 405(d) Healthcare organizations continue to be prime targets for malicious actors. OCR data in a recent Health IT Security article showed more than 127 breaches reported so far in 2022 had impacted over 6 million individuals....
News Headlines Suggest Heightened Cybersecurity Awareness, IT Practitioners Know the Reality
Nation-State Attacks Have Been a Daily Threat for Years, Preparation is King The headlines in the news continue to focus on the Russian invasion of Ukraine. As a result, organizations worldwide have reverberated with the increased probability of a cyber war being launched against critical infrastructure originating from Russian state-sponsored...
6 Components of a Vulnerability Threat Management Program
Protecting your healthcare organization’s ePHI from cybersecurity threats can seem daunting. However, without investing the time and personnel into threat management, your team could be leaving sensitive information vulnerable to cybercriminals. As a result, many healthcare organizations will opt for a VTM program to lower their risk. This guide...
Patient Care and Confidence Affected by Cyber Attacks on Healthcare
The Healthcare Clients and Consumers Grade Cybersecurity Software and Services, Black Book™ Industry 2022 Survey, has been released. After surveying almost 3,000 security and IT professionals, Black Book Research shared its findings. In the same survey, Black Book Research named Fortified Health Security, Top-Ranked Cybersecurity Vendor for Outsourcing & Security...
Fortified Health Security Named Top Cybersecurity Vendor for Outsourcing & Security Network Managed Services by Black Book Research
Fortified Health Security, Healthcare’s Cybersecurity Partner® (“Fortified”), announced that it has been named Black Book Research Top-Ranked Cybersecurity Vendor for Outsourcing & Security Network Managed Services in 2022.
Data Breach Response: 8 Steps to Take for Your Organization’s Needs
In 2021, more than 550 organizations reported healthcare data breaches to HHS, impacting over 40 million individuals. The reality is that cybersecurity breaches can occur despite data loss prevention efforts. What your organization does after a breach can make all the difference in limiting the impact of an attack. When...
How a Continuous SOC Can Help Healthcare Facilities Avoid Data Loss
As healthcare organizations focus on patient care and essential daily functions, cybersecurity may not be prioritized appropriately. However, a strong cybersecurity program is vital to maintaining patient care and day-to-day operations. Failing to implement effective security measures could put your organization at risk.. Many healthcare organizations are turning to cybersecurity...
Fortified Roundtables: Connect, Network, Exchange Best Practices with Healthcare Cybersecurity Peers
Sharing knowledge and experience amongst peers is essential to increasing the cybersecurity posture of healthcare. As an industry leader, Fortified feels that we have an obligation to provide a platform for open collaboration and information sharing. So, we created the Fortified Roundtables. Fortified’s hour-long web conferences held monthly give healthcare and life...
Prepare Your Organization to Fight the Phish!
As we continue our Cybersecurity Awareness Month journey, an initiative led by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCSA), we reflect on the theme of week two: spotting and fighting phishing attempts. Phishing can often lead to vulnerabilities that can result in ransomware or other types of malware, and...
Do Your Part #BeCyberSmart: A Look at Fort Healthcare
This October, led by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCSA), Fortified Health Security is proud to support Cybersecurity Awareness Month. Through our multifaceted approach, we are committed to remaining proactive by providing the healthcare industry with unique purpose-built strategies, services, and tools that...
With cyberattacks on the rise we must all do our part and #BeCyberSmart
By Dan L. DodsonNow in its 18th year, Cybersecurity Awareness Month continues to raise awareness about the importance of cybersecurity across our Nation. Led by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA), Cybersecurity Awareness Month is a collaborative effort between government and industry...
How Proposed 2021 HIPAA Changes Will Affect Your Healthcare IT
On January 21, 2021, an important development in cybersecurity news was released. The United States Department of Health and Human Services (HHS) and the Office for Civil Rights (OCR) issued Notice of Proposed Rulemaking (NPRM) to modify the Standards for the Privacy of Individually Identifiable Health Information (Privacy Rule) under the Health...
Data Breach Lawsuits on the Rise: Is Your Healthcare Organization Prepared?
Cyber attacks in the healthcare industry threaten patient care and privacy. While PHI and PII exposure is often immediate, there is also a long-term cost of cyber attacks. Healthcare organizations often face lawsuits following breaches. And these incidents are on the rise. Lawsuits are financially costly, but they can also...
Video: Fortified Health Security Briefing on Cyber Insurance
Cyber Insurance Requirements Have Changed. Are You Prepared? The game has changed, it’s different, it’s harder, and it’s happening NOW.We want to help ensure you're involved in the process, stay informed on the cyber insurance landscape, and prepared so you don't get caught off-guard. https://vimeo.com/575059070 Discussion Focus Areas: Healthcare Cyber...
Working for You: Fortified Offers NIST Counsel on Resource Guide
Fortified recently responded to an opportunity from NIST to comment on the utility of NIST Special Publication (SP) 800-66, Revision 1, commonly referred to as the Resource Guide.
How Cyber Insurance Fits into Your Cybersecurity Posture
Cyber attacks continue to increase, and the cost of these data breaches can be significant. An IBM study found that generally the average data breach costs $4.35 million. When applied to the healthcare industry, this average cost rises to $10.10 million. As organizations face increasing risks, now is the time...
Threat Hunting in Healthcare: What It Is & Why It Matters
Incident response is a vital part of a strong cybersecurity program. However, responding to cybersecurity threats and attacks is only part of the equation. Healthcare organizations need to be proactive in their security solutions, spotting threats before they lead to data loss. This is where threat hunting comes in. A...
The Difference Between SIEM and EDR/MDR, and Why You Need Both
Today’s cyber criminals are using increasingly sophisticated tactics to access ePHI from healthcare organizations. Malicious actors obtained the private health records of more than 6 million individuals in October of 2022 alone from 71 reported breaches, according to the HIPAA Journal. When facing these advanced types of threats and increased...
Hidden Signs of a Healthcare Data Breach (and How to Detect Them)
When it comes to cybersecurity best practices, timely detection is key. This is especially important for healthcare organizations. Hospitals, clinics, and administrative offices handle private patient data every day, and this data in the wrong hands can have significant consequences. But how can you tell when your network has been...
How Healthcare Organizations Should Strengthen Their Cybersecurity Framework Against The Latest Cyber Attacks
A strong cybersecurity framework guards against the most prominent cyber threats in healthcare, but this framework should also be scalable to meet new threats. In the first quarter of 2021, the healthcare industry has faced several new types of attacks, and organizations need to step up their security practices to...
Is Electronic Protected Health Information (ePHI) Getting Outside Your Healthcare Organization?
Under HIPAA regulations, health information or data that can be used to identify an individual patient is categorized as protected health information (PHI) and must undergo a wide range of practices explicitly designed to protect patient confidentiality. Covered entities must implement processes and controls to ensure confidentiality, integrity, and availability...
5 Reasons to Conduct Yearly Penetration Testing
When protecting your network from external threats, you sometimes need to think like a hacker. You can better prevent cyber attacks by understanding how perpetrators could potentially access sensitive data. Therefore, penetration testing should be a part of your yearly cybersecurity plan. Why You Need Yearly Penetration TestingWhat Is Penetration...
Evolving the Cybersecurity Landscape
At Fortified Health Security, we know that there are multiple factors that our industry must pay attention to as we look towards building robust cybersecurity programs. One of the most pressing factors is the rapid digitization of healthcare that was happening before the pandemic and is happening at a faster...
Kwampirs Trojan Targets Healthcare Industry
In response to the latest attack on the healthcare industry by the cybercriminal group Orangeworm, Fortified Health Security COO William Crank penned a commentary for the Disaster Recovery Journal – the leading industry resource for business continuity professionals covering disaster recovery, crisis management, and risk management. Throughout the article, Crank discusses what...
HIPAA Changes Regarding COVID-19: What Healthcare Organizations Should Know
In light of the COVID-19 pandemic, the Department of Health and Human Services (HHS) and the Office of Civil Rights (OCR) have issued a Limited Waiver of HIPAA Sanctions and Penalties. While HIPAA regulations and protected health information (PHI) protections are still in place, it’s important that healthcare facilities understand...
How to Maintain Cyber Security When Employees Work Remotely
With the spread of Covid-19 around the country, many organizations are sending employees home to work remotely. Doing so can be an essential health and safety precaution. However, remote work comes with additional cybersecurity threats. Here are some key ways that organizations can prioritize network security while employees are dispersed....
Do You Meet HIPAA’s 3 Areas of Security?
According to the HIPAA Journal, this past October (2022) suffered 71 data breaches, accounting for the unwarranted disclosure of protected health information (PHI) of over 6 million individuals (an all-time high for 2022). As the occurrence of cyber-attacks and data breaches continue to grow, medical providers find themselves tasked with...
Benefits of Continuous HIPAA Analysis
Within the HIPAA Security Rule Administrative Safeguards, requirements include that covered entities “implement policies and procedures to prevent, detect, contain and correct security violations.” This standard requires both Risk Analysis and Risk Management which assist an organization's management in developing protections for confidentiality, integrity, and availability of ePHI within the...
Five Major Cybersecurity Threats to Your System – And How To Protect Against Them
Healthcare facilities continue to combat the threat of cyber attacks within their digital landscapes, forcing IT departments across the globe to continuously adjust their lines of defense against a network security compromise or data breach. The increasing complexity and sophistication of cybercriminal activities mean healthcare organizations must remain vigilant against...
Cybersecurity Reminder: Microsoft Server 2008/R2 & Windows 7 Support Ends January 2020
As a reminder, Microsoft Server 2008/R2 & Windows 7 is coming to an end, and so are its tech support and updates. Microsoft’s reminder announcement poses a significant cybersecurity threat to any healthcare IT infrastructure running on Microsoft Server 2008/R2 & Windows 7: “The specific end of support day for...
Healthcare Security Incident and Event Management (SIEM): An Introduction to Capabilities
As healthcare organizations continue to embrace and rely on a diverse range of technologies to both manage and treat patients, their internal IT and cybersecurity environments continue to become more complex and challenge situational awareness. This rampant surge of innovation utilization is unlikely to change over the next several years...
Designating Number of Connected Medical Devices
Connected medical devices are being used in various capacities to resolve several issues currently plaguing the healthcare industry on a global scale. Once considered peripheral resources, due to new science and innovation, medical devices and Internet of Things (IoT) technologies have now become integrated into the very fabric of most...
How to Recover From a Healthcare Data Breach
Despite the healthcare industry's continuous efforts to minimize cybercriminal activity, cyber attacks continue to make their tumultuous presence known throughout the industry. As a result, medical facilities, providers, and payers have prioritized protecting their digital infrastructure against a data breach. Healthcare organizations are consistently implementing preventative measures such as update...
How A Virtual Information Security Program Revolutionizes Cybersecurity in Your Organization
Despite continuously integrating innovative cybersecurity upgrades and enhancements, the healthcare industry remains a primary target for cyber attacks and data breaches for a myriad of reasons. A medical facility's technology environment contains employee and provider information, financial data, as well as a full spectrum of highly sensitive patient information, all...
How to Conduct an Inventory of Your Medical Devices to Plan for Confident Cybersecurity
Connected medical devices have become an integral part of the patient experience here in the United States. Recent statistics demonstrate that a single hospital room may have, on average, 15-20 medical devices in it, many of them connecting directly into the healthcare facility's IT infrastructure. Beyond the number in each...
HIPAA and Cybersecurity Applied to Medical Devices
Medical devices are increasingly being connected to hospital networks, the internet, patient home networks, and to other medical devices. This broad sharing of information allows physicians to respond to patient needs more quickly and tailor treatment plans based on outputs from medical devices in use. However, these capabilities also increase...
Healthcare Cybersecurity Tips for Apps and Mobile Devices
Every healthcare organization, regardless of the devices used, faces the risk of cybersecurity attacks. However, the use of mobile devices and apps can bring the risk of a cyber-attack to another level. Apps and mobile devices are highly effective, affordable, and convenient ways for medical facilities to manage a diverse...
6 Recommendations for Taking Your Healthcare Information Management Systems from Compliance to Confidence
Cyber attacks are a regular occurrence throughout the healthcare industry. Unfortunately, not only are data nad network security compromises common, they are also costly. A cyberattack can cost the organization $1.4 million in recovery expenses alone on average, including loss of productivity, service disruption, and irreparable reputation damage for medical...
Pause To Consider: Multi-factor Authentication
With passwords becoming routinely compromised and users frequently concerned with memorizing lengthy and complex passwords, multi-factor authentication or MFA is becoming increasingly popular. However, the implementation of MFA solutions is not always properly executed to maximize efficiency and effectiveness. When implementing MFA, pause to consider: Have you identified the most...
Pause To Consider: Executive Buy-In
Many CISOs and CIOs are constantly fighting for budget dollars and find themselves competing against other strategic initiatives within their organization. Gaining executive buy-in is critical to any successful cybersecurity program and is required to protect patient information adequately. Buy-in throughout the organization is increasingly more critical as the threat...
Pause To Consider: Staffing Issues
Having trouble finding, recruiting, and retaining the right level of cybersecurity talent to support your organization adequately? You can find comfort in the fact that you are not alone, as this challenge is impacting healthcare organizations across the country. Unfortunately, that comfort doesn’t fix your problem; but thinking differently might....
Pause To Consider: Presenting to C-Suite
Many CISOs and CIOs struggle to find the most effective way to present their cybersecurity program to their board. Delivering this message in a meaningful way can prove to be important as your organization manages risks associated with cybersecurity. Pause to consider: Are you providing information about your program in...
Pause To Consider: Generic Usernames
Generic usernames pose an increased risk to digital environments, making them a desirable target for hackers. Most users don't realize that generic usernames such as “administrator, marketing, finance, surgery, and helpdesk” (among others) often have default passwords assigned to them; as a result, they are not often policed or audited...
PAUSE TO CONSIDER: Privileged Access
Improperly managed privileged Active Directory accounts can introduce significant risk to healthcare organizations. There are several types of privileged accounts, including service accounts and administrator accounts. These accounts are valuable targets for attackers due to management difficulties and the level of access they provide. When managing privileged accounts, pause to...
PAUSE TO CONSIDER: Phishing Attacks
Do your job responsibilities include overseeing or maintaining an environment that provides a secure platform for patient data and business resources? If so, you're probably alarmed by the daily headlines outlining phishing attacks that target healthcare industry employees. Pause to consider: Are your workforce members aware of current phishing trends...
PAUSE TO CONSIDER: Monitoring Connected Medical Devices
Due to widespread adoption and a demand to improve patient outcomes, network-connected medical devices are playing a vital role in every health organization. These devices can decrease costs while increasing the quality of care patients receive. Despite the many advantages these devices offer, improper management can introduce significant risk to...
PAUSE TO CONSIDER: SIEM
Many organizations understand the value of capturing and correlating log events from different security platforms and have invested heavily in Security Information and Event Management (SIEM). SIEM technologies allow organizations to combine custom use-cases tailored to their business with distributed threat intelligence and incident management. To get the most out...
PAUSE TO CONSIDER: Passwords
One of the most common ways bad actors gain access to digital environments is by guessing passwords. With so many devices being interconnected, cracking into one device could mean access to several devices, as well as extensive access to sensitive information. It is always a good idea to change your password...
PAUSE TO CONSIDER: Remote Access
How often is remote access evaluated and monitored? In today’s environment, the majority of the healthcare workforce does not need remote access. However, a large segment of remote-access users retains access that they no longer use or need. Unused, open-access accounts need to be disabled. Pause to consider: When was...
PAUSE TO CONSIDER: Security Governance and Compliance Strategy
Many healthcare organizations need a formal process to govern their organization’s security program. A strong security governance and strategy program will better position your organization to respond to changes in technology, regulatory laws, and the ever-changing threat landscape while effectively managing information security and privacy risk to the organization. Pause to...
PAUSE TO CONSIDER: Access and Privileges
Hopefully, by now, your information security team has a defined process in place to remove access or privileges when an employee is terminated or transfers to a new role in your organization. Most of us are quick to disable accounts in Active Directory or email, but do you have a...
PAUSE TO CONSIDER: Workforce Targets
It's no secret that the healthcare industry is highly susceptible to cyber-attacks. However, most executives don't realize that many attacks are directed at what's arguably an organization's weakest link: its workforce. Workforce members and their user accounts are generally targeted via phishing attempts or brute force attacks. Pause to consider:...
PAUSE TO CONSIDER: Vulnerability Threat Management
Vulnerability threat management [VTM] is a key fundamental for compliance with HIPAA. Every healthcare organization should utilize VTM for foundational security management. To set your initiative up for success, pause to consider these essential factors: Are you performing authenticated or non-authenticated scans? Authenticated scans use authenticated user credentials to grant...
PAUSE TO CONSIDER: Evaluating Technologies
We often get so focused on individual tools, technologies, or processes that we don’t step back to evaluate the risk to the organization as a whole. Pause to consider these general questions to see if you’ve accounted for risk in your security program: Are you managing the risk of your...
PAUSE TO CONSIDER: Business Associates
The HHS Office for Civil Rights (OCR) issued new documentation on May 24, 2019 specifying requirements and prohibitions for which Business Associates are directly liable. The OCR is authorized to take enforcement actions against Business Associates for ONLY 10 specific HIPAA violations. Some of these violations may include failure to:...
PAUSE TO CONSIDER: Leveraging Technology
By nature, security technologies often have a broad spectrum of visibility into your devices, usage and environment. Pause to consider the following questions to determine if you’re getting the most value out of your security tools: Are you taking advantage of possible integrations? Security technologies work best when they are...
PAUSE TO CONSIDER: Data Loss Prevention
Data Loss Prevention (DLP) technologies often require a significant time commitment, both for deployment as well as for overall system management. Don't risk costly missteps and wasted resources when assessing potential DLP solutions for your organization. As you evaluate DLP technologies, pause to consider: How will DLP policy violations be...
PAUSE TO CONSIDER: Managing Connected Medical Device Security Program
The critical nature of connected medical devices, coupled with the fact that responsibility for the devices often lies with multiple teams, means managing the security of your connected medical devices requires unique and strategic planning. To ensure your connected medical device program is successful, pause to consider: How to Properly...
PAUSE TO CONSIDER: Managed Security Service Provider
Partnership and engagement are critical in managed service engagements. These relationships differ from an on-demand type relationship, requiring a different approach for success. For these relationships to succeed, and for you to derive value from these engagements, a managed service organization must truly serve as an extension of your team....
PAUSE TO CONSIDER: Connected Medical Devices
Connected medical device security platforms can often provide more value than just security insights. To ensure you're receiving all the value from your connected medical device security platform, pause to consider: Questions to Answer About Managing Connected Medical Devices Are you leveraging visibility provided by your connected medical technology to...
PAUSE TO CONSIDER: Patch Management
Servers are often the last systems to get patched or upgraded, making them an ideal target for cybercriminals on a global scale. Hackers can easily launch a successful cyber attack on a server, exploiting the lack of an updated security system, or even vulnerability patches that have not yet been...
Benefits of a Web Application Firewall for Your Healthcare Organization
Application attacks are on the rise in healthcare organizations across the country. The high demand from both patients and staff to have easy access to records and scheduling has resulted in a growing number of web applications being offered to users. However, as with any technology surge, the increase in...
Maintaining Strong IT Security When Using Medical Devices
Connected medical devices have been around, in various capacities, for the last several decades. However, the current advancements in technology, coupled with Internet of Things (IoT) innovation, has officially and effectively redefined the impact and reliance on these devices throughout the healthcare industry. Seen as an emerging technology and enabler...
Medical Device Security: How to Assess Your Organization’s Readiness in 2019
Medical devices have experienced a significant growth surge over the last several years. Recent statistics indicate that a single hospital room may hold as many as 15-20 devices at any given moment, proving their value as an integral part of the patient care experience. The latest generation of medical devices,...
Cybersecurity Alert: 3 Medical Devices that Might Put You at Risk in 2019
Medical devices are some of the most vital tools for healthcare organizations of every size and scope, impacting the performance (and public perception) of a facility. Practices throughout the country utilize an increasingly wide range of medical equipment to improve care levels as well as stand out as a market...
Health IT: Can You Stay Connected and Avoid Security Risks?
Every year, various advancements in technology make their way into the healthcare industry. From the Internet of Things [IoT] to telemedicine, all of these innovations are changing the way medical institutions deliver care across the world. While many significant benefits come from these modern healthcare innovations, staying connected at all...
Is Your Healthcare Organization in Danger of a Cybersecurity Breach?
Network security and cyber attacks continue to plague healthcare organizations of every size and scope across the US. A recently report,released by the Office for Civil Rights (OCR), showed that over 15 million patient records were compromised in 2018 – a number that's only expected to grow with the surge...
Can You Find and Secure the Sensitive Information in Your Organization’s Network Infrastructure?
All healthcare organizations capture and store sensitive data sets within their IT networks that require extensive protection from unauthorized access or a cyber attack. Unfortunately, many organizations struggle with identifying and safeguarding this information simply because they don't know what qualifies as sensitive data and where such data is located...
Medical Device Security: A New Front In The Cybersecurity War
Medical devices play a vital role in every health organization’s overall performance as well as the quality of care they can provide to patients. Today's state-of-the-art devices deliver a wide range of benefits, including the opportunity for continuous monitoring, telemedicine, and data analytics. Despite the many advantages offered through these...
Five Things Your Healthcare Company Should Do After a Data Breach
Healthcare data breaches have been on the rise in recent years. Medical data is always a big target for cybercriminals as it is much more valuable than personal information alone. Many of these data breaches are considered an outside cyber attack – a lapse in cybersecurity due to a hacker...
Who (And What) Should Have Access to Your Network?
Preventing a data breach or network security lapse is a top priority for healthcare organizations worldwide. The very nature of the devices and data transmitted across every internal system, coupled with a typically (and often, alarmingly) low number of cybersecurity resources makes healthcare environments exceptionally vulnerable to a cyber attack....
A Security Checklist for Healthcare Organizations
Cyber attacks and data breaches are on the rise in virtually every industry that utilizes and stores sensitive information to power its operations. However, the healthcare vertical is often particularly vulnerable to a network security lapse, often finding their data loss prevention efforts powerless against the increasingly sophisticated and complex...
5 Threats to Your Healthcare Organization’s Cybersecurity Posture
No matter what the industry, virtually every business battles the constant threat of a cyber attack on various levels. However, for healthcare organizations, the highly sensitive nature of the information stored throughout their networks makes them a prime target for hackers across the globe. As cybersecurity threats within the vertical...
6 Considerations for HIPAA Compliant Penetration Testing
Strategic and results-driven penetration testing (also known as pen testing) helps healthcare enterprises maintain the highest levels of network security across their entire organization. Often referred to as "ethical hacking," a penetration test examines an organization’s digital enterprise vulnerabilities and assesses those vulnerabilities through the same methods that a real-world...
Fortified Health Security: Is Your Network Vulnerable To Intrusion?
Healthcare organizations across the country suffer from a myriad of network security issues that put their (and their patients') data at risk. Unfortunately, many healthcare administrators don't realize the scope of their cybersecurity vulnerabilities or just how at risk their organization is for a potential data breach – until it's...
5 Things Healthcare Companies Miss When Getting Ready for an Audit
Audit. The mere mention of the word can instantly stir mild to moderate panic throughout even the most diligent healthcare IT department. For a myriad of reasons, most healthcare organizations dread the idea of conducting industry mandated cybersecurity risk assessments. Compliance evaluations are time-consuming, disrupting normal corporate activities and potentially...
Do Your Security Policies Include Your Vendors?
Healthcare organizations recognize the vital urgency of maintaining uncompromised internal network security at all times. Under constant threat of a cyber attack, IT departments at hospitals and providers of every size prioritize cybersecurity practices, making proactive prevention and detection of a data breach a primary goal. What to Know About...
7 Things Every Healthcare CTO Should Consider When Planning a HIPAA Risk Analysis
The HIPAA Security Rule mandates that healthcare organizations must have the appropriate technical, administrative, and physical safeguards in place to protect the integrity, security, and confidentiality of electronically stored health data against a data breach or cyber attack. To remain compliant with HIPAA regulations, healthcare organizations must conduct an annual...
Healthcare IT: The Biggest Healthcare Spam Threats (And How to Avoid Them)
The practice of spam began innocently enough in 1978 (yes, really), when Gary Thuerk, a marketing associate at Digital Equipment Corporation sent a promotional mass-email to 400 recipients touting the arrival of the company's new T-series of VAX systems. The reaction was swift, fierce, and familiar: unadulterated annoyance. Today, the...
Healthcare IT: Your Essential Guide to Making Email More Secure
Yes, there are countless cybersecurity threats plaguing healthcare networks across the country at any given moment. However, recent reports suggest that many data breaches across any industry specifically occur due to poor email security practices within the company. A 2017 Data Breach Investigations Report indicates that as much as 66%...
Fortified Health Security: What Does It Mean to Be HITRUST-Certified
Healthcare providers across every specialty rely on high-performing technology to both treat and support their patients. Whether it's integrating a cloud-based CRM to automate back office functioning such as appointment scheduling or billing, or incorporating the latest, state-of-the-art connected medical devices into a treatment protocol, innovation is at the very...