Every organization should understand their own unique risk profile based on the impact to their organization of a breach, the vulnerabilities that exist within their unique portfolio of information assets and all reasonable threats that might exploit those vulnerabilities including insider threats.
Efforts by the federal Office of Civil Rights to investigate data breaches at healthcare organizations are of great concern to security and compliance officers at healthcare organizations.
Although the healthcare industry has been notoriously resistant to change, its transformation at the hands of digitization has recently picked up pace.
Olean Medical Group CEO Christine Strade received a text June 11 telling her the group’s electronic medical record system was down. That’s how she learned her company had been cyber-attacked.
Every CISO knows that April, 2019 was a grim milestone: the worst month for healthcare data breaches
since 2010, when the Office for Civil Rights began reporting healthcare data breaches of 500 individuals
or more publicly. In April, 44 breaches were reported and the medical records of nearly 700,000 people
A new report from KLAS and CHIME find that while large organizations are becoming more sophisticated in their cybersecurity strategies, smaller providers are not keeping pace with governance, risk management, and other security elements.
Clearwater is proud to announce that Executive Chairman Bob Chaput has been invited to be part of the faculty for a new professional certificate program offered by the University of Texas. Titled Leadership in Healthcare Privacy and Security Risk Management, the first-in-the-nation certificate is designed to help fill the acute need for a trained, non-technical workforce to protect healthcare systems in Texas and our nation from fast-evolving cybersecurity threats.
Identity and access management continues to be a top medical device cybersecurity challenge, says security expert Mark Identity and access management continues to be a top medical device cybersecurity challenge, says Clearwater security expert Mark Sexton. “A number of these devices cannot be integrated into normal technical controls, like Active Directory, that you use on your network to manage user access and monitor that activity,” he notes in an interview with Information Security Media Group.
Clearwater finds the majority of health breaches last year were caused in some way by a server, while a CynergisTek report found a lack of resources, tools, and talent make it difficult for the C-suite to keep up with the threat landscape.