Cybersecurity

Blockchain is proving itself for real-world healthcare applications

Experts from IEEE, UC San Diego and Health Linkages say the key is to make sure it’s the “right solution for the […]

Providers: Email is main data breach culprit

A recent survey by Mimecast and HIMSS Analytics states that providers overwhelmingly rank email as the No. 1 source of potential data […]

OCR: 5 ways to fight internal health data breaches

Healthcare organizations can protect themselves from internal healthcare data breaches. “Healthcare organizations are a prime target for internal breaches caused by former […]

Health systems’ IT priorities for 2018: Cybersecurity technologies, patient-generated data

Many major health systems plan to invest in improved cybersecurity technologies next year. “Cybersecurity improvements are top of mind for health IT […]

10 top health technology hazards for 2018

With 2017 coming to a close, it is time to look ahead to 2018 and the top 10 health technology hazards to […]

HXG Cybersecurity Series: Multi-Factor Authentication

The Everlasting Issue of Breaches and How We Avoid Them We recently discussed how security breaches affect the healthcare system and the […]

Cloud security and IoT are the new peanut butter and jelly

For enterprises using cloud services with IoT, it’s critical to adhere to as many security practices as possible. Experts weigh in on […]

Hospital datacenters: Extinct in 5 years?

Cloud Computing: Datacenter of the future “Prominent healthcare executives are predicting a drastic shift from on-premise IT infrastructure into the cloud. That […]

DHS: KRACK vulnerability puts every Wi-Fi connection at risk

Privacy & Security News “A Belgian researcher discovered a flaw in the protocol that could allow a hacker to hijack connections, launch […]

7.1M Patients Use Remote Monitoring, Connected Medical Devices

Cloud computing will change the nature of hospital IT shops

Healthcare IT News: Cloud Computing “IDC says cloud services are transforming IT departments into lines of business as they acquire daily operations […]