The search found 4155 results.
Blog
The alarming frequency and severity of cyberattacks have created major challenges for healthcare organizations, and repercussions stretch well beyond IT department headaches. Digital identity solutions can help.
News
The healthcare system continues to buckle under continued strain post-pandemic: the growing demand for medical care, nationwide labor shortages, and ever-evolving cybersecurity threats are among healthcare workers’ daily challenges.
News
While more generative AI tools are becoming available in healthcare for diagnostics and patient communication, it is important for clinicians and healthcare staff to be aware of the security, privacy, and compliance risks when entering protected health information (PHI) into a tool like ChatGPT.Read the full article at medcitynews.com
News
With the exception of the Covid pandemic, few crises have perplexed the medical community as much as the opioid epidemic. Thanks to the efforts of groups like the CHIME Opioid Task Force, there’s been a reduction in the number of opioid prescriptions and an increased awareness for treating overdoses.And yet, the death toll continues to rise. According to the CDC, 11,355 overdose deaths were reported during the 12-month period ending April 2023, compared with 110,394 deaths in the 12-month period ending March 2022.
News
Governments must build a “web of trust” to counter online fraudsters who exploit natural disasters using bogus help pages that con the public out of money, a cybersecurity expert is urging. “What’s often the most exploited piece of a normal organization – it’s their supply chain,” says Joel Burleson-Davis, SVP of Worldwide Engineering at cyber company Imprivata. “Well, the interesting thing that happens with natural disasters is you create all sorts of ad hoc supply chains, right?
Blog
As the data threat landscape continues to wreak havoc, it highlights the pressing need for dedicated third-party access security. We'll look at some of the key challenges that come into play, as well as recommendations on how to secure third-party access to protect your most sensitive data and systems from potential threats.