The best way to ensure electronic health record systems can share data interoperably is for industry to adopt the Fast Healthcare Interoperability Resources standard, or FHIR, say federal officials. While the deployment of a single, consolidated EHR, called the Military Health System GENESIS, has the Department of Defense on a path to interoperability, the FHIR data standard that serves as...
Malicious cyber actors did not slow their siege on the healthcare industry in the final month of 2022. Federal agencies warned organizations about new ransomware strains and other cyberthreats. Still, news of compromised sensitive patient information emerged just days before the new year, and cyberattacks aren’t showings signs of easing in 2023.   Thirty-eight percent of security leaders across industries...
Cyberattacks don’t stick to business hours, so healthcare organizations must make sure their security is tight 24/7. But with many in-house IT teams spread thin, it’s a demanding task that can result in sleepless nights.  If your small team has security alert fatigue, consider a partnership for managed detection and response. The right MDR partner can provide much-needed support in...
Cybersecurity is critical for healthcare organizations as well as for federal agencies that handle patient data. Less than a year after President Biden released the Executive Order on Improving the Nation’s Cybersecurity in May 2021, the Office of Management and Budget released a federal strategy to move the U.S. government toward a zero-trust approach to cybersecurity. At the AFCEA Bethesda...
Healthcare providers store, handle and transmit some of the most sensitive information a person can possess, from personal health data to Social Security and credit card numbers. Meanwhile, data loss incidents are on the rise, and they happen 38 times more frequently than leaders estimate, according to a 2021 Tessian report. Remote work is also affecting data security, according to...
Augusta University's College of Nursing realized it needed to better train students on how to support family members when patients are near the end of life after recent graduates told faculty how emotionally unprepared they were the first time they faced the situation. In response, the Georgia university has built virtual reality simulations that enable nursing students to role-play various situations so they...
Network segmentation is commonly used in healthcare to manage security for connected medical devices. Network segmentation is critical to the National Institute of Standards and Technology’s SP 800-207 zero-trust framework. While network segmentation reduces the attack surface, organizations still experience identity-related vulnerabilities. Here are some common questions that may arise when getting deeper into identity segmentation. 1. What Is Identity Segmentation? Gartner...
Cybersecurity is paramount for healthcare organizations, especially since an attack can slow down or even halt patient care. Managed detection and response could be an appropriate solution for organizations with inadequate staffing or budget constraints that still want to bolster security. MDR combines technology and human expertise to remotely provide customers with the capabilities of a modern security operations center...
Connected medical device security is a major focus among healthcare leaders. An average hospital room can contain 15 to 20 connected medical devices, and any vulnerabilities could seriously impact patient care. One 2022 survey found that healthcare organizations with a higher number of connected medical devices were more likely to experience a cyberattack. With connected medical device security top of...
Pharmacists play a critical role in healthcare delivery today. The local pharmacy is a mainstay of the community, serving as a convenient, accessible destination for a wide range of healthcare services and wellness needs. Technology allows retail pharmacists to do more purpose-driven, patient-centered work. Pharmacies took a lead role in providing vaccinations during the pandemic. They are using technologies including artificial...

FOLLOW ME

0FansLike
0FollowersFollow
0SubscribersSubscribe

POPULAR ARTICLES