Cybersecurity

The digital security of healthcare institutions and data is a growing concern, with an increasing number of cyberattacks each year against healthcare systems, which are seen as easy targets. Cyber attacks often use ransomware to target personal health information, patient data and medical devices to cut off access to the data until a ransom is payed to the hacker. Cybercriminals have become more sophisticated, using malware, ransomware and spyware to attack outdated and vulnerable systems and software. Due to the interconnected nature of hospital IT systems today, the weakest link can be older web-enabled medical devices, including clinical and non-clinical systems. Employees are also a major target of attacks via malicious e-mails that prompt them to open attachments that then download malware onto the hospital's IT system.

Ransomware attacks doubled in a five-year period

Healthcare organizations are under threat from a rapid increase in ransomware attacks, putting patient health information at risk.

The American Hospital Association (AMA) is warning healthcare systems the Russians may attempt cyber attacks amid rising tensions of the war in Ukraine and the international community's response. #Ukraine #warinukraine #ukrainewar

Data breach may have exposed Medicare patient data

The breach may involve Medicare beneficiaries’ personally identifiable information (PII) and/or protected health information (PHI).

Thumbnail

HHS warns healthcare providers of new ransomware threat

“Royal appears to be a private group without any affiliates while maintaining financial motivation as their goal,” HHS warns.

Thumbnail

Cyberattack threats rise amid medical device growth

As healthcare devices become ever more digitally connected and network capabilities expand with new technology, the threat of cyberattacks is rising.

The American Hospital Association (AMA) is warning healthcare systems the Russians may attempt cyber attacks amid rising tensions of the war in Ukraine and the international community's response. #Ukraine #warinukraine #ukrainewar

MercyOne back online after ransomware attack

MercyOne Central Iowa is mostly back online in the aftermath of a ransomware attack of its parent company, CommonSpirit Health.

The American Hospital Association (AMA) is warning healthcare systems the Russians may attempt cyber attacks amid rising tensions of the war in Ukraine and the international community's response. #Ukraine #warinukraine #ukrainewar

MercyOne recovers from cyberattack of parent company

CommonSpirit became aware of an IT attack that was impacting some of its facilities, and the healthcare company subsequently took certain systems offline, including electronic health records and patient portals.

The American Hospital Association (AMA) is warning healthcare systems the Russians may attempt cyber attacks amid rising tensions of the war in Ukraine and the international community's response. #Ukraine #warinukraine #ukrainewar

HHS Office for Civil Rights struggling to keep up with cyberattacks

Cyberattacks are rising fast in the healthcare space, and the federal office tasked with dealing with these breaches is completely overwhelmed.

 

Thumbnail

Data breaches cost an average of $10M

Breach costs have risen 13% over the last two years, and the increase could be passing down through the economy, influencing higher prices for goods and services.

Around the web

Compensation for heart specialists continues to climb. What does this say about cardiology as a whole? Could private equity's rising influence bring about change? We spoke to MedAxiom CEO Jerry Blackwell, MD, MBA, a veteran cardiologist himself, to learn more.

The American College of Cardiology has shared its perspective on new CMS payment policies, highlighting revenue concerns while providing key details for cardiologists and other cardiology professionals. 

As debate simmers over how best to regulate AI, experts continue to offer guidance on where to start, how to proceed and what to emphasize. A new resource models its recommendations on what its authors call the “SETO Loop.”