The search found 4055 results.
A crucial aspect of cybersecurity was missing from Colonial Pipeline when a criminal hacking group was able to access a shared internal drive and demanded close to $5 million in exchange for the files: multi-factor authentication.
Protecting patient data is a Herculean task for healthcare organizations, as protections must be in place for internal and external threats. On top of that, HIPAA regulations add in a layer of required parameters that healthcare organizations must have in place to be compliant and not face penalties.
According to the 2021 Executive Order, “Zero Trust Architecture allows users full access but only to the bare minimum they need to perform their jobs. This data-centric security model allows the concept of least-privileged access to be applied for every access decision, where the answers to the questions of who, what, when, where, and how are critical for appropriately allowing or denying access to resources.”
Healthcare data breaches are increasing exponentially year after year, and it doesn’t seem like they’re going to slow down any time soon. It’s important for healthcare IT professionals to take steps to safeguard their systems, whether that means protecting against external threats posed by hackers and cyber criminals or securing internal threats that come from access abuse from internal users.
If you’re in the cybersecurity field, chances are you’ve come across Zero Trust architecture (or any variants of it) enough to know what Zero Trust means. Essentially, the Zero Trust cybersecurity approach is kicking old methods to the curb while embracing the basic principles of security.
In recent years, we have seen increased interest and adoption of machine learning (ML) and artificial intelligence (AI) technology in healthcare. Organizations have been piloting solutions that range from helping diagnose patients, to ensuring the privacy of their data. While the industry is beginning to see some benefits from these tools, many end-users are starting to ask important questions like: How does the tool work, or Where are my data stored?
Monitoring is the 5th element of the 7 elements of an effective compliance program. It is a continuous task that compliance and privacy teams must do to ensure any inappropriate accesses are detected and resolved in a timely manner.
Two recently published reports discuss the high cost of healthcare data breaches organizations can incur. The Department of Health and Human Services estimates that it takes a breached healthcare organization a full year to recover.
The National Institute of Standards and Technology (NIST) has released a request for information for the NIST Privacy Framework: An Enterprise Risk Management Tool ("Privacy Framework").1 The purpose of the privacy framework is to improve management of privacy risk, which is a major gap across healthcare organizations today.
Often when discussing common healthcare security threats, external breaches are the main focus. However, recent evidence shows those breaches are not the biggest concern to hospitals – they’re more concerned with breaches that can happen within their own halls, by their own internal staff. HIMSS Media recently conducted a study on behalf of SailPoint, and the consensus was that healthcare provider organizations are highly concerned with insider threats.