Focus: Technology

HHS releases healthcare cybersecurity best practices

Guidance includes 10 best practices for mitigating hacking threats


The Department of Health and Human Services (HHS) released a healthcare cybersecurity guide with best practices for dealing with cyber threats, according to an article on the Campus Safety website.

"Health Industry Cybersecurity Practices: Managing Threats and Protection Patients," consists of four volumes. One is geared toward for small healthcare organizations, one for medium and large providers, another with resources and templates for end users and a fourth for cybersecurity best practices surrounding threats and protecting patients.

The guide was created after two years of consulting with more than 150 cybersecurity and healthcare experts.

The publication focuses on current threats, including: 

• E-mail phishing attack

• Loss or theft of equipment or data

• Insider, accidental or intentional data loss

• Attacks against connected medical devices that may affect patient safety

Read the article.



May 10, 2019


Topic Area: Information Technology


Recent Posts

Biofilm 'Life Raft' Changes C. Auris Risk

Microscopic survival structure protects fungal pathogen from disinfectants and help it survive for long periods.


How Healthcare Restrooms Are Rethinking Water Efficiency

Manufacturers discuss strategies, technologies and design approaches that help healthcare facilities meet their sustainability goals.


Northwell Health Finds Energy Savings in Steam Systems

Case study: A proactive steam trap maintenance program is delivering millions in savings, fast payback and measurable carbon reductions across one of the nation’s largest health systems.


The Difference Between Cleaning, Sanitizing and Disinfecting

Cleaning methods and products have various purposes in reducing the spread of germs.


Jupiter Medical Center Falls Victim to Third-Party Data Breach

The third party has determined through an investigation that, at least as early as January 22, 2025, an unauthorized third party gained access to personal health information on legacy systems.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.