HIPAA Security Rule Amendment: Key Public Comments and Next Steps

HIPAA Security Rule Amendment: Key Public Comments and Next Steps

Major cybersecurity breaches continue to plague the US healthcare industry, and on December 27, 2024, the U.S. Department of Health and Human Services (HHS) issued a Notice of Proposed Rulemaking (NPRM) to ...
UK NHS API Flaw Exposes Critical Mobile Security Risks

UK NHS API Flaw Exposes Critical Mobile Security Risks

A recent vulnerability discovered in an UK National Health Service HS API has once again highlighted the risks associated with insecure mobile application programming interfaces (APIs). The flaw reportedly allowed unauthorized access ...
ICYMI: Interesting Things We Learned at the HIMSS 2025 Conference

ICYMI: Interesting Things We Learned at the HIMSS 2025 Conference

We had a good time talking to folks last week in our ColorTokens booth at the Healthcare Information and Management Systems Society conference in Las Vegas. The crowd was plentiful and engaged ...
New Guidelines: Cybersecurity Resilience in the Healthcare Industry

New Guidelines: Cybersecurity Resilience in the Healthcare Industry

Lou Morentin, VP of Compliance & Privacy There are a number of significant changes coming to Healthcare Cybersecurity requirements. While not all are finalized, they point the way towards Health and Human ...
Incorporating Mobile App Security into HIPAA’s Healthcare Security Rule

Incorporating Mobile App Security into HIPAA’s Healthcare Security Rule

A proposed update to the HIPAA Security Rule to Strengthen the Cybersecurity of Electronic Protected Health Information was issued in June 2024. Comments were requested and Approov has proposed some changes. This ...
™

Bringing Breach Resiliency to Labs, Diagnostics, Devices, and Research Systems

The innovation ecosystems within the Healthcare and life sciences (HCLS) industry  are filled with a plethora of connected digital devices and systems – from laboratory information systems (LIMS) to critical IT systems ...
Exploiting Medical Devices: Attack Vectors, Cyber Threats, and Advanced Defense Mechanisms

Exploiting Medical Devices: Attack Vectors, Cyber Threats, and Advanced Defense Mechanisms

Imagine a scenario where a ransomware attack cripples a hospital’s ventilators, infusion pumps are manipulated to deliver incorrect dosages, or a CT scanner is hijacked to serve as a launchpad for a ...
vulnerabilities, healthcare, breach, organizations, healthcare, cybersecurity healthcare UnitedHealth CISO

Critical ‘Backdoor’ Discovered in Widely Used Healthcare Patient Monitors 

On January 30, 2025, the U.S. Food and Drug Administration (FDA) issued a safety communication regarding cybersecurity vulnerabilities in Contec CMS8000 and Epsimed MN-120 patient monitors ...
Security Boulevard