Cybersecurity

The digital security of healthcare institutions and data is a growing concern, with an increasing number of cyberattacks each year against healthcare systems, which are seen as easy targets. Cyber attacks often use ransomware to target personal health information, patient data and medical devices to cut off access to the data until a ransom is payed to the hacker. Cybercriminals have become more sophisticated, using malware, ransomware and spyware to attack outdated and vulnerable systems and software. Due to the interconnected nature of hospital IT systems today, the weakest link can be older web-enabled medical devices, including clinical and non-clinical systems. Employees are also a major target of attacks via malicious e-mails that prompt them to open attachments that then download malware onto the hospital's IT system.

Top 10 patient safety concerns released by ECRI Institute

ECRI Institute has released its annual top patient safety concerns for 2017, which aims to identify potential threats to patient safety while addressing challenges and offering suggestions and resources to address them.

Thumbnail

HIMSS 2017: Experts encourage efforts to improve cybersecurity, breach response

Cybersecurity was one of the many highlighted topics during HIMSS 2017 in Orlando, with a number of presentations focusing on industry efforts to secure patient information and still be able to share such information. Hussein Syed, chief security information officer at RWJBarnabas Health, and Ladi Adefala, MBA, senior security strategist at Fortinet, discussed how healthcare must adapt to protect patients.

Lack of security in medical devices, records pose threats to patients

Hacking has made its way into the heart of healthcare, with vulnerabilities in many devices essential to patients. Following a string of hacked medical devices, including pacemakers and insulin pumps, and compromised health data, cyber security is a topic more prevalent than ever for those in healthcare.

HHS releases guide on reporting, monitoring cyber security

The Department of Health and Human Services (HHS) has released a letter regarding cyber threats faced by healthcare organizations, including reporting and monitoring practices.

Henry Ford, VisionIT offer mobile communication to clinicians

Henry Ford Health System and VisionIT have partnered to offer CareTrail, a mobile application, to improve communication between clinicians. The platform provides clinicians with a tool that offers on-call scheduling, availability updates and additional workflow optimizations.

Thumbnail

HIMSS 2017: Boehner & Rendell lead list of big-name keynote speakers

It’s time once again for HIMSS to host hospital management engineers, administrators and other industry professionals at its 2017 annual meeting.  HIMSS17—which runs Feb. 19-23 at the Orange County Convention Center in Orlando—is scheduled to include a variety of networking events and educational sessions, headlined by four highly acclaimed keynote speakers. 

Thumbnail

HIMSS 2017: How one hospital prepared for, and survived, a ‘hacktivist’ cyberattack

Sometimes, hackers aren’t motivated by money when they go after patient records. Luckily for hospitals and health systems, even so-called “hacktivists” can be stopped with the same defenses that fend off other cyberattacks.

2016: The year of the data breach

The healthcare system faced an inceasingly common occurance in 2016, with a report by Protenus Breach Barometer claiming there was, on average, one data breach a day.

Around the web

Compensation for heart specialists continues to climb. What does this say about cardiology as a whole? Could private equity's rising influence bring about change? We spoke to MedAxiom CEO Jerry Blackwell, MD, MBA, a veteran cardiologist himself, to learn more.

The American College of Cardiology has shared its perspective on new CMS payment policies, highlighting revenue concerns while providing key details for cardiologists and other cardiology professionals. 

As debate simmers over how best to regulate AI, experts continue to offer guidance on where to start, how to proceed and what to emphasize. A new resource models its recommendations on what its authors call the “SETO Loop.”