Shoddy IT infrastructure invites hackers

Hackers are attracted to hospitals with rapid adoption of IT


Training and maintaining “digital hygiene” in a healthcare facility can reduce the threat of a ransomeware attacks, according to an article on the Healthcare Exec website.

Hackers are attracted to hospitals with rapid adoption of IT without a concomitant increase in the number and sophistication of IT support staff, according to new research from Marshall University.

A massive increase in health IT utilization in a relatively short time because of the Meaningful Use program ensured security deficiencies, which may now open systems up to cyber criminals, the study said.

Proper risk mitigation and disaster recovery are crucial to reduce costs and the likelihood of data loss.

Read the article.



September 5, 2019


Topic Area: Security


Recent Posts

ISSA Introduces Healthcare Platform to Advance Safer, Cleaner Patient Environments

This new resource integrates training, research and cross-sector collaboration to raise care standards and improve patient outcomes.


Third-Party Tracking Settlement is a Compliance Wake-Up Call for Healthcare Facilities Managers

Mount Sinai Health System agrees to a $5.3 million settlement to resolve claims it improperly shared patient data with Facebook through tracking tools.


ECU Health Behavioral Health Hospital Hosts Ribbon-Cutting Ceremony for New Facility

The new facility features 144 beds and a healing environment for behavioral health patients.


Aspire Rural Health System Reports Data Security Incident

Upon detecting the unauthorized activity, Aspire immediately worked to contain the incident and launched a thorough investigation.


Fatal Flaws: Strategies for Active Attackers

Anything that goes wrong with the response is the liability exposure of the organization — not the employee and not the police.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.