How a Healthcare Provider Secures Its Cloud Infrastructure

Insights from a healthcare security executive on how automating risk mitigation and compliance boosted their cloud infrastructure security. The post How a Healthcare Provider Secures Its Cloud Infrastructure appeared first on Ermetic ...

Are Fake COVID Testing Sites Harvesting Data?

Over the past few weeks, I’ve seen a bunch of writing about what seems to be fake COVID-19 testing sites. They take your name and info, and do a nose swab, but ...
Allina Health Gurucul Customer Story: Monitoring Medical Devices

The State of Cybersecurity Preparedness in Healthcare

As if healthcare didn’t have enough to worry about, with overpacked facilities and overworked staff... The post The State of Cybersecurity Preparedness in Healthcare appeared first on Gurucul ...

Healthcare Ransomware Attacks Persist

Ransomware attacks launched against healthcare providers are on the rise as 2021 draws to a close. The HHS Office for Civil Rights’ HIPAA Breach Reporting Tool points to several high-impact ransomware attacks ...
Does Your Health App Meet HIPAA Compliance Requirements?

Does Your Health App Meet HIPAA Compliance Requirements?

Photo by Mockup Graphics on UnsplashHealthcare providers increasingly use mobile apps and web applications as part of the move to telemedicine. As of July 2021, analyst McKinsey noted that telehealth utilization had stabilized ...
FHIR API Security Research Sparks Debate

FHIR API Security Research Sparks Debate

Alissa Knight released her report “Playing with FHIR” a couple of weeks ago (download it here) about her investigations into the security of healthcare apps and APIs which use the FHIR standard ...
HIPAA Compliance for Healthcare Apps

HIPAA Compliance for Healthcare Apps

What Application Developers Need to Know About HIPAA CompliancePhoto by Alexander Sinn on UnsplashIncreasingly, patients want to access their healthcare information using mobile applications or web applications. Instead of calling a doctor’s office, ...

Overcoming Common Healthcare Compliance and Security Challenges Post-Pandemic

For the 11th year in a row, healthcare is at the top of IBM’s “Cost of a Data Breach Report,” ranking number one among all industries for the highest average cost of ...

A Death Due to Ransomware

The Wall Street Journal is reporting on a baby’s death at an Alabama hospital in 2019, which they argue was a direct result of the ransomware attack the hospital was undergoing. Amid ...
Ensuring Secure Remote Care For The Elderly

Ensuring Secure Remote Care For The Elderly

In this article, we’ll be looking at the role that mobile health or mHealth apps and Application Programming Interfaces (APIs) are playing in remote care of the elderly. We shall also consider ...