Get notifications!

Micro-segmentation: One way to improve network security and patient safety

Connected medical devices are some of the most critical assets for hospitals today – and they are often the most vulnerable within their networks.

Coronavirus & Work From Home Security

With the outbreak of the novel coronavirus came shelter-in-place orders and the common sense desire to keep people away from potential virus hotspots. For hospitals, that's resulted in a very serious effort to move non-essential employees to a work-from-home model. 

Coronavirus, Telemedicine, and Security

With the outbreak of the novel coronavirus crisis, hackers smell blood in the water. Focused on addressing the crisis, already stretched super thin, and forced to improvise at each new turn, healthcare organizations in particular present an attractive target for hackers.

3 Security Considerations for Hospitals Moving to Cloud Infrastructure

The embrace of cloud solutions in healthcare has been accelerating at a frenetic pace. Since the introduction of the Affordable Care Act which compelled the adoption of Electronic Medical ...

Five Nearly Universal Enterprise Information Security Best Practices

In the world of enterprise information security, the specific areas of knowledge and expertise that set you apart in your current situation might not be as directly and immediately applicable to a different IT environment or different professional circumstances. ...

Load Posts

Five Nearly Universal Enterprise Information Security Best Practices

In the world of enterprise information security, the specific areas of knowledge and expertise that set you apart in your current situation might not be as directly and immediately applicable to a...

How Network Analytics Can Enhance Biomedical Engineering Workflows

In large organizations it's only natural for most of the workforce to ignore network analytics — mentally relegating it to the  domain of IT and IT alone. In hospitals, more often than not, that...

Put Your Knowledge to the Test: Connected Medical Device Risk Exposure

In times like these, we could all use a distraction. With that in mind, we've created this short quiz on the state of connected healthcare and its digital risks.

The US Coronavirus Relief Package: How Hospitals Can (and Cannot) Claim and Spend Funds

As COVID-19 continues to plague the world, governments are beginning to pass legislation aimed at both strengthening critical infrastructure and propping up the wider economy.

Cause for Optimism: Resourcefulness in the Face of COVID-19

There seems to be a lot of doom and gloom in the air these days and it's not hard to understand why. While I admit to sometimes playing the role of Negative Nelly myself, the truth is that all...

How Improved Tracking Processes Can Boost Medical Device Availability

As part of the worldwide battle against COVID-19, hospitals will need to maximize the availability and visibility of key medical assets. By automatically locating medical devices and tracking...

10 Quick Cybersecurity Tips for Hospitals in the Midst of COVID-19

There's no denying it and no point in ignoring it, so let's just acknowledge it: there's a big ugly elephant in the room and it goes by the name COVID-19. It's on everyone's mind, has already...

The Next Generation of Healthcare Risk Management Has Arrived

In business as in life it’s important to cover your backside. More important and higher minded though is covering your bases. If you engage in risky behavior, it’s a good idea to insulate yourself...

How Automating Healthcare Processes Changes the Way Hospitals Operate

From improving patient experience to enhancing medical procedures, technology functions as the engine driving the healthcare system forward.

The CCPA and Healthcare: What You Need to Know

Providing consumers greater control and transparency over their personal data, the California Consumer Privacy Act (CCPA) went into effect on January 1, 2020.

Everything You Need to Know About the MDhex Vulnerabilities

Today, GE Healthcare — in coordination with CyberMDX and CISA (formerly ICS-CERT) — publicly disclosed the discovery of six software design flaws affecting seven products in their popular...

Windows 7 EoL Has Arrived: Now What?

Although Microsoft officially ended mainstream support for Windows 7 back in January 2015, the company continued to release security patches and offer updates for an additional five years. As of...

5 Hospital Technology and Transformation Predictions for 2020

Each year we take some time to look at the trends we see happening in hospital technology and transformation. It is instructive to study the patterns and disruptive pressures contributing to...

Grading Our 2019 Healthcare Predictions

Along with all its holiday cheer, this time of year always seems to bring a bounty of predictions as to what the industry will experience over the course of our next lap around the sun. Often,...

5 Medical Information Security Lessons for 2020

In the world of information security, each new year brings new opportunities for growth and learning. From new cyber threats and mitigations to new tools and techniques, there's no shortage of new...

5 Top Healthcare Technology Trends Going Into 2020

It goes without saying that advances in healthcare technology are fundamentally changing the way that medicine is practiced. Recently, it would seem that these advances have begun to evolve more...

A Compendium of Connected Healthcare Technology Facts & Figures

Healthcare is the most cyber-targeted industry, with nearly one out of every six US data breaches happening in hospitals and the problem is only getting worse. 15,085,302 individual medical...

After the Dust Has Settled: GDPR in Healthcare

It's been more than a year since the General Data Protection Regulation (GDPR) has taken effect. The European Commission's wide-reaching law was designed to protect the privacy of EU citizens and...

How Cybersecurity Factors into the Medical Device Procurement Process

In 2018, the global medical device and clinical asset market was worth approximately $8.98 billion. By 2025, it’s estimated that it will be worth $61.35 billion. Hospitals, on average, spend 11-13%

How MDS² Data Can Inform Smarter Medical Device Workflows

In 2004, Nema (the National Electrical Manufacturers Association), together with HIMSS (Health Information and Management Systems Society) and a number of other security experts and government...

The Top 4 Problems Hospitals Face When Addressing Cybersecurity

It's already a well-known fact: cybersecurity constitutes a major challenge for connected healthcare operations, regardless of their unique organizational structures and processes. When each...

How Hospitals Prioritize Digital Risk Management

In the last several years, data breaches and cyber attacks on healthcare organizations have been in the news with alarming frequency.

HealthOps: The Next Frontier of Healthcare Management

This article is the final installment of a three-part series. We've already examined how those traits and trends converged around the principle of agility. Now, we'll discuss how the push for...

Smarter, Lighter, More Proactive: The Strategy of Business Agility

This article is the second installment of a three-part series. In the previous installment, we examined how technology evolved and how it has culminated in the streamlined, automated, intelligence...

The Internet of Medical Things (IoMT) Punctuates a Century of Progress

"When wireless is perfectly applied, the whole earth will be converted into a huge brain, which in fact it is, all things being particles of a real and rhythmic whole.”

Why It’s Wrong to Sync Medical Device Patching & Scheduled Maintenance

Machines are indispensable, yet imperfect. They work fine one day and break down the next. What’s more, even if the machine remains in essentially the same working order, you’ll still need to...

How Medical Device Cybersecurity Complements Physical Access Control

It’s only reasonable that access to sensitive medical devices should be restricted to those who require it. Physical access guidelines are designed to ensure that only professionals with the...

Why Cybersecurity is Important for Biomedical Engineers

Biomedical engineers are the unseen force behind some of modern medicine's greatest achievements. Biomedical engineers are at the forefront of exciting research and they are staples of day-to-day...

How to Track and Act On Clinical Asset Utilization Insights

HDOs occupy a unique position: on the one hand, their focus is on patient care, and their success is measured by health outcomes. On the other hand, they are businesses, with investors,...

New Anesthesia Machine Vulnerability Disclosure Tells a Bigger Story

For the first time, on July 9, 2019, ICS-CERT disclosed a vulnerability specifically impacting anesthesia machines. If exploited, the vulnerability would allow an attacker to silence alarms, alter...

Why CVE-2019-5599, SACK Panic, Is Causing Headaches

On June 18, 2019, Netflix researchers, together with MITRE, issued an advisory containing four vulnerabilities relating to how Linux handles TCP Selective-Acknowledgement (SACK) at the kernel...

Cyber-Enabled Hospital Merger and Acquisition Management

The healthcare industry in the US has been facing widespread disruption for some years. The Affordable Care Act in 2010 demanded that the industry carry out wholesale changes to its processes and...

MOST READ POSTS

MOST RECENT POSTS

POSTS BY TAGS


──────
Give a Little Love and It All Comes Back to You!

healthcare-industry-report