Just as we tell our clients that privacy and security is everyone’s responsibility, we also believe it’s our responsibility to help educate the industry about
Just as we tell our clients that privacy and security is everyone’s responsibility, we also believe it’s our responsibility to help educate the industry about
ComplyAssistant’s Gerry Blass comments on ways to mitigate rising cyberattacks in Fierce Healthcare’s “Amid rising cyberattacks, a more discreet trend: EHR snooping” article from March
An article released by Gartner reported that by the year 2025, cyberattackers will have weaponized operational technology (OT) environments to successfully harm or kill humans. OT attacks, also known as attacks on hardware and software that monitors or controls equipment, assets, and processes, are on the rise. Consider the ransomware attack on the Colonial Pipeline, for example. Effects were felt up and down the East Coast, resulting in a payout of $4.4 million and damage to hospitals, emergency medical services, and law enforcement agencies.
When looking for a new GRC software platform, it’s important to have one with all the latest features including task management, audits, and more.
In today’s ever-changing cyber landscape, we talk a lot about what measures to take if you have experienced a data breach or ransomware attack. Who do I call if my patient’s health information has been comprised? Do I need to pay the ransom? How long will my organization be down and disrupt the continuity of care?
As cybersecurity threats continue to wreak havoc on companies of all sizes, the importance of education and training for leaders is critical. In partnership with HFMA New Jersey, our team hosted a free, comprehensive webinar with health information technology (HIT) leaders from three of the top healthcare organizations located in New York and New Jersey. The discussion focused on internal and external cybersecurity risks and identified new risks directly resulting from the COVID-19 pandemic.
In today’s world, it’s easier than ever for hackers to take advantage of organizations online. Recent examples of this have come in the wake of the Colonial Pipeline attack and the Scripps Health EHR breach. The repercussions of both attacks—which include gasoline shortages up and down the east coast and disruption of EHR, website, and patient portal—are continuing to be felt long after the bad actors do their dirty work. So, what can organizations do to protect themselves?