Cybersecurity

The digital security of healthcare institutions and data is a growing concern, with an increasing number of cyberattacks each year against healthcare systems, which are seen as easy targets. Cyber attacks often use ransomware to target personal health information, patient data and medical devices to cut off access to the data until a ransom is payed to the hacker. Cybercriminals have become more sophisticated, using malware, ransomware and spyware to attack outdated and vulnerable systems and software. Due to the interconnected nature of hospital IT systems today, the weakest link can be older web-enabled medical devices, including clinical and non-clinical systems. Employees are also a major target of attacks via malicious e-mails that prompt them to open attachments that then download malware onto the hospital's IT system.

Could hackers set their sights on your medical device?

Hackers are best known for stealing patient data through computers, but they may have added an entirely new avenue to encroach on your privacy—by infiltrating medical devices.

FDA annual clinical investigator course promotes safety, accuracy

The U.S. Food and Drug Administrations (FDA) has announced the seventh annual Clinical Investigator Training Course, in partnership with the University of Maryland's Center of Excellence in Regulatory Science and Innovation, will be held Nov. 7-9 for healthcare professionals around the world.

Thumbnail

Q&A: Mark Hollis, CEO of MacPractice, on battling hackers with patient data security systems

MacPractice, a developer of practice management and clinical software, has released a specialized system of encryption for Mac OS X to keep patient data secure. In an exclusive interview with Clinical Innovation & Technology, Mark Hollis, CEO of MacPractice, speaks about MacPractice and the constant hacking threat faced by the healthcare industry.

HHS introduces final rule to increase access to clinical trials

The U.S. Department of Health and Human Services (HHS) has announced a final rule to make information about clinical trials more available to the public. The National Institutes of Health (NIH) has also announced a complementary policy for the registration and submission of results to ClinicalTrials.gov for all NIH-funded trials.

FBI urges ransomware victims to report all infections

The FBI has released a statement urging companies across all industries, healthcare included, to report ransomware attacks to federal law enforcement, helping them get a step up in evaluating just how dire the situation is.

CommonWell Health Alliance launches database for patients to access personal health data

More CommonWell Health Alliance patients will have access to their health data as the association extends its current service that will simplify the patient experience.

Thumbnail

With hacks on the rise, cybersecurity vendors flood market, try to appeal to providers

As cyber attackers increasingly become a threat to healthcare providers' data assets and IT systems, new cybersecurity vendors are entering the market as hospitals and clinics are looking for better ways to protect their patients' information, as well as their own financial and trade secret information.

Central Ohio Urology Group becomes latest healthcare company to be hacked

The hackers have struck once again, this time attacking the Central Ohio Urology Group in Gahanna, according to The Verge.

Around the web

Compensation for heart specialists continues to climb. What does this say about cardiology as a whole? Could private equity's rising influence bring about change? We spoke to MedAxiom CEO Jerry Blackwell, MD, MBA, a veteran cardiologist himself, to learn more.

The American College of Cardiology has shared its perspective on new CMS payment policies, highlighting revenue concerns while providing key details for cardiologists and other cardiology professionals. 

As debate simmers over how best to regulate AI, experts continue to offer guidance on where to start, how to proceed and what to emphasize. A new resource models its recommendations on what its authors call the “SETO Loop.”