Healthcare Cybersecurity Weekly Briefing 06-29-2018

Critical Informatics Healthcare Cyber Security

Critical Informatics Healthcare Cyber Security

[VIDEO] NewsJacker June Recap
Cyberthreats from China, voice-activated bank transfers, DNS rebinding attacks pwn-ing home-connected microphones, SCOTUS rules that warrants are required for cell phone surveillance, and more.

125+ Cybersecurity Companies in Healthcare to Know | 2018
CI Security (Seattle, Wash.). CI Security provides Managed Detection and Response services, combining purpose-built technology with expert security analysts to perform full-cycle threat detection, investigation, response, and recovery. Forged in healthcare, CI Security’s technology platform, Security Operations Center, and Information Security consulting services help healthcare customers gain critical insight into their security posture.

Cyber Warnings Going Ignored as 1 in 4 Companies Still Investigating Alerts Manually
The gap between the need for skilled cybersecurity employees and the people available to fill these roles continues to grow. BAE Systems’ new research shows that the skills gap is the primary challenge keeping organizations from reaching their security goals, with 50% of businesses identifying the lack of staff with the required security skills and expertise as the leading issue.

Top 10 Cybersecurity Best Practices for Healthcare CISOs
The number and frequency of these threats—ransomware, cryptocurrency mining, data-stealing malware, advanced persistent threats, malicious insiders, and careless employees, to name a few—can be overwhelming. It can seem like healthcare CISOs and their teams are always one step behind the well-funded bad guys. Sentara Healthcare CISO Dan Bowden has learned some hard lessons about improving cybersecurity during his career as a healthcare CISO.

Healthcare Internet Crimes Cost Victims $925,849 Last Year
“Schemes may include offers for fake insurance cards, health insurance marketplace assistance, stolen health information, or may involve medications, supplements, weight loss products, or diversion/pill mill practices. These scams are often initiated through spam email, Internet advertisements, links in forums or social media, and fraudulent websites,” the report explained.

Judge Dismisses Lawsuit Charging LabCorp with HIPAA Violation
Lee-Thomas argued in her lawsuit that LabCorp failed to shield her PHI from public view at its computer intake station at Washington, DC-based Providence Hospital. The station was next to a Quest Diagnostics computer intake and her information was visible to the person using the Quest station, she said in her compliant.

 

Stay up to date on the Healthcare Information Security news that you need to know by signing up for our Healthcare Briefing Here.

====

Critical Informatics and the Critical Informatics logo are the trademarks of Critical Informatics, Inc. All other brand names, trademarks, service marks and copyrights are the property of their respective owners.  © 2017 Critical Informatics, Inc. All rights reserved.