Security Holes in Medicaid Security Program Risks Patient Data
Maryland did not adequately follow federal requirements to secure its Medicaid data and information systems, according to an HHS Office of Inspector General report.
Maryland did not adequately follow federal requirements to secure its Medicaid data and information systems, according to an HHS Office of Inspector General report.
Healthcare, warns Verizon’s 2018 Data Breach Cybersecurity Investigations Report (DBIR), is the only industry where insider threats are greater than threats from the outside. Human error remains a major contributor to healthcare risks. DBIR analysis also flags a shift in how social attacks, such as financial pretexting and phishing, are used.
Verizon has re-examined the data within their Data Breach Investigations Report (DBIR) series to focus in on the healthcare sector’s unique profile and security challenges, and particularly the use/abuse of protected health information (PHI). Verizon’s 2018 Protected Health Information Data Breach Report (PHIDBR) is underpinned by 1,368 incidents from this caseload covering 27 countries.
Verizon has re-examined the data within their Data Breach Investigations Report (DBIR) series to focus in on the healthcare sector’s unique profile and security challenges, and particularly the use/abuse of protected health information (PHI). Verizon’s 2018 Protected Health Information Data Breach Report (PHIDBR) is underpinned by 1,368 incidents from this caseload covering 27 countries.
Cryptonite, a leader in moving target cyber defense, announced the availability of its “2017 Health Care Cyber Research Report,” which shares the company’s findings on healthcare cyberattacker activity in 2017
This year’s "McAfee Labs 2018 Cybersecurity Threats Predictions Report" focuses on the evolution of ransomware from traditional to new applications, the cybersecurity implications of serverless apps, the consumer privacy implications of corporations monitoring consumers in their own homes, long-term implications of corporations gathering children’s user-generated content, and the emergence of a machine learning innovation race between defenders and adversaries.
This year’s "McAfee Labs 2018 Cybersecurity Threats Predictions Report" focuses on the evolution of ransomware from traditional to new applications, the cybersecurity implications of serverless apps, the consumer privacy implications of corporations monitoring consumers in their own homes, long-term implications of corporations gathering children’s user-generated content, and the emergence of a machine learning innovation race between defenders and adversaries.
“To geek or not to geek?” that is not the only question. The real c-suite cyber-security question for executives might be, “Trust or not to trust?” All things IT still intimidates most people, no matter the generation. Being informed about security, network structures, and intrusive software challenges many experts in the field. Handing the responsibilities over to internal or contracted specialists without understanding the general concepts of cyber-security creates a blind spot. Not unlike, not grasping financial concepts because the accounting department handles that stuff.
As healthcare payer operations integrate new practices to align with the value-based care paradigm, payers are critically challenged with identifying root causes to solve issues in order to improve and sustain performance. BHM Healthcare Solutions play a critical role in a larger operational system and offers two resources for consideration when reviewing the larger payer operational landscape.
The KPMG 2017 Cyber Healthcare & Life Sciences Survey of providers and health plans found a dramatic rise in computer system breaches, cyber-attacks, and data compromises, which include patient records, over the past two years. Despite that increase, more executives, who oversee protecting patient records and other information, say they are better prepared than two years ago to protect themselves against cyber-attacks.