Buyers Beware: Fraudulent Cisco Hardware Puts Spotlight on Procurement and Compliance
Procurement compliance and security are often put on the back burner when companies try to save money. They see the same devices they could buy from a [...]
Procurement compliance and security are often put on the back burner when companies try to save money. They see the same devices they could buy from a [...]
Each year IBM works with Ponemon Institute to research breaches across several sectors of the economy. For the 12th consecutive year, healthcare breaches had the highest price [...]
You know what the risks are, but how do you explain them to your healthcare clients in a way that they’ll understand? Most people are not very [...]
In January of 2021, an amendment to the HITECH Act, known as HR 7898, was signed into law. The law has several nicknames, including the Cybersecurity Best [...]
A bill recently introduced in the U.S. House of Representatives aims to address gaps in medical device cybersecurity. Details of Proposed Law to Address Medical Device Cybersecurity [...]
In March of 2022, President Biden signed into law the Consolidated Appropriations Act 2022. The Consolidated Appropriations Act 2022 wears many hats. The law reauthorizes the Anti-Violence [...]
As incidents of cybercrime increase, forward-thinking healthcare organizations and the companies that support them are looking for ways to minimize the risk of becoming a victim of [...]
In April of 2022, the Department of Health and Human Services (HHS)’ Office of Information Security issued a 27-page publication, entitled “Insider Threats in Healthcare.” The publication [...]
In January of 2021, HR 7898, nicknamed the Cybersecurity Best Practices bill, was signed into law. Under this law, the Department of Health and Human Services (HHS) [...]
Each quarter the Department of Health and Human Services’ Office for Civil Rights issues a cybersecurity newsletter. The newsletter highlights cybersecurity trends affecting the healthcare industry. As [...]