HIPAA Breaches Rising
HIPAA breaches have increased exponentially as health information is extremely valuable on the black market. It seems like there is a new data breach in the news every day, [...]
HIPAA breaches have increased exponentially as health information is extremely valuable on the black market. It seems like there is a new data breach in the news every day, [...]
The well-established security firm Check Point recently ranked cryptomining as the leading cyber threat in healthcare - ahead of ransomware. Cryptomining malware, also known as cryptocurrency mining malware, refers [...]
Presbyterian Healthcare Services is the latest victim of phishing attacks in the healthcare industry. A healthcare phishing attack occurs when unauthorized access to an organization's network is gained by [...]
The Health Insurance Portability and Accountability Act (HIPAA) mandates safeguards to be in place to secure protected health information (PHI). PHI is any individually identifying health information such as [...]
Implementing effective HIPAA cybersecurity measures is essential to safeguarding protected health information (PHI). However, according to a recent study conducted by Brigham Women's Hospital and Harvard Medical School, many [...]
California-based Shingle Springs Health and Wellness Center provides medical, behavioral, dental, and pharmaceutical services. On April 7, 2019, the center discovered that its server had become [...]
The personal health information (PHI) of up to 15,000 patients who received medical care through Los Angeles County’s hospitals and clinics was exposed in a March, 2019 phishing scheme. [...]
Ransomware attacks are cause for concern in the healthcare industry, the wealth of sensitive information, large budgets, and lack of proper safeguards, make the industry the perfect target for [...]
Cybersecurity should be at the top of the list or priorities for anyone working in the healthcare industry. Unfortunately, cyberattacks in healthcare are a growing concern. [...]
Phishing attacks can be difficult to detect by nature. Attackers disguise themselves as a trusted entity, and send their victims links with malicious content, either through email, text, or [...]