Healthcare Cybersecurity Weekly Briefing 07-13-2018

Critical Informatics Healthcare Cyber Security

Critical Informatics Healthcare Cyber Security

Critical Informatics Recognized by Gartner in the 2018 Market Guide for MDR Services
“Our platform is purpose-built for highly regulated sectors such as healthcare, finance, and government. We don’t require any agents to be deployed, nor additional technology purchases. Using packet capture, we can protect regulated records while retaining the ability to conduct investigations and confirm incidents with 100% accuracy. We keep those packets on the customer’s premise inside their protected perimeter. All of this means a seamless implementation and elimination of more false positives.


Three Huge Ways Tech Is Overhauling Healthcare
As exponential technologies explode onto the scene all at once, we are about to witness the unprecedented rise of personalized, ubiquitous, and intelligent healthcare. In this blog, we’ll discuss how converging exponential technologies are enabling:
·       Personalized medicine
·       Delocalized (“everywhere”) care
·       The new era of intelligent prevention
We are truly living in an era when anything is possible.


Why Cybersecurity Is Critical to Healthcare Innovation
HHS in June issued a request for information soliciting public comment “on a planned initiative of the Office of the Deputy Secretary of HHS to develop a workgroup to facilitate constructive, high-level dialogue between HHS leadership and those focused on innovating and investing in the healthcare industry.” […] “One of the biggest challenges that the workgroup will face is identifying an effective way to incentivize or otherwise promote ongoing, responsible innovation,” CHIME writes.
The Lack of Medical Device Security — Accidents Waiting To Happen
So is our government stepping-up? Surprisingly, HHS has been all over the problem dating back to 2014. But not surprisingly, legislation has gone nowhere. The device suppliers are not required to provide detailed bills of material that would help hospital supply chain professionals (and their IT counterparts) assess device-based network security risks. Of course, it’s one thing to not know the device’s operating system. It’s quite another if you didn’t feel the need to ask.


Stay up to date on the Healthcare Information Security news that you need to know by signing up for our Healthcare Briefing Here.


Critical Informatics and the Critical Informatics logo are the trademarks of Critical Informatics, Inc. All other brand names, trademarks, service marks and copyrights are the property of their respective owners.  © 2017 Critical Informatics, Inc. All rights reserved.