You see the news: how many healthcare entities are struck by ransomware. But how many of them conducted business impact analyses before they were victims? Too few, says Cathie Brown of Clearwater. She discusses the value of doing a BIA before the crisis strikes.
As the U.S. hammers out national infrastructure legislation, implements President Biden's recent cybersecurity executive order and adopts other related initiatives, more attention and funding needs to be allocated to strengthen the healthcare sector's cybersecurity posture, industry groups urge.
Healthcare went through five years of transformation over the course of 2020. How does this new telehealth focus most change how healthcare security leaders must view cybersecurity? Hank Schless of Lookout weighs in on remote services, connected devices and the cloud.
Please join MK Palmore for a keynote discussion that will draw from his experiences and perspective, offering thoughts on challenges and opportunities in securing today’s digital healthcare organizations.
Beyond the accounting, IP is the engine of growth, the future of the company.
Unfortunately, IP theft is a growing problem for the pharmaceutical industry
and other IP-intensive industries.
Understanding the nature and
scope of these cyber threats – and how to
combat them – is critical to protecting...
The telemedicine landscape continues to flourish – but so does medical fraud. Dean Nicolls discusses the most prevalent forms of fraud and how identity verification can help ensure all populations are both included and secured.
Hacking incidents - including ransomware attacks, phishing scams and episodes involving vendors - are still the dominant culprits in major health data breaches being reported to federal regulators so far this year. Why?
Good news in the fight to prevent COVID-19 infections: Researchers report that a digital contact-tracing app rolled out in England and Wales that's designed to keep users' data private and secure is helping to blunt the spread of the pandemic. They urge continuing global uptake of such apps.
Within the last few years, digital transformation and Cloud services have increased the
complexity of IT infrastructure, making you reliant on multiple third
parties to keep your data safe. The threat landscape has also increased in breadth and depth with more
attacks, more kinds of attacks and more targeted...
You can’t secure what you can’t see. In fact, gaining visibility and control over all your devices is one of the most important, yet challenging tasks for IT and security teams. The number of connected devices has exploded. At the same time, there are more diverse devices – IoT, IoMT and OT—that are sometimes...
To be the first to bring a ground-breaking treatment or vaccine to market, pharmaceutical organizations need employees to stay productive no matter where they are or what device they're using. But this greater connectivity is exposing your critically important intellectual property (IP) to countless mobile risks. It's...
This year's pandemic accelerated digital transformation throughout the business world, particularly the healthcare sector. Security leaders and their teams have had to support rapidly changing infrastructures and expanding attack surfaces, as well as introduce new technologies across the healthcare supply chain. But...