article thumbnail

Upcoming Healthcare Regulations and Their Impact on Healthcare IT

Healthcare IT Today

This final rule does not apply to healthcare providers but instead is directed at health information networks and health information exchanges, as well as developers of certified health IT. Regulators have a greater success rate when engaging industry experts to develop rules in health IT.

article thumbnail

Secure Your Hospital’s Future: The Critical Need for Robust Telemedicine Security

Healthcare IT Today

The following is a guest article by Narinder Singh , Co-Founder and CEO at LookDeep Health In 2016, attackers gained unauthorized access to Banner Health’s systems through the payment processing system used in the organization’s food and beverage outlets and used it as a gateway to access patient information.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Ways to Close the Cloud Security Gaps in Healthcare

Healthcare IT Today

The following is a guest article by TJ Houske, Senior Vice President of Technology, Operations, and Engineering at OTAVA Ransomware attacks against healthcare organizations doubled in the last five years, according to a new study by JAMA Health Forum. The most common victims have been health clinics.

article thumbnail

Automation In Rural Health: It Should No Longer Be An Afterthought

Healthcare IT Today

The following is a guest article by Baha Zeidan, CEO at Azalea Health. Deploying advanced technologies is often an afterthought, especially for rural hospitals struggling to retain talent and navigate the increasingly complex regulatory environment. This is usually best deployed through a technology-enabled service.

Health IT 142
article thumbnail

Lessons From a Ransomware Attack: The Importance of Partnership & Collaboration

Healthcare IT Today

The following is a guest article by John Gaede, Director of Information Systems at Sky Lakes Medical Center. Now imagine that business is a hospital. Imagine a rural business is the victim of a cyberattack. A nefarious person or group convinces an unsuspecting employee to open an email promising a bonus.

article thumbnail

Healthcare Cybersecurity Is Difficult to Maintain, How a Security Operations Center Can Help

Healthcare IT Today

The following is a guest article by Preston Duren, Vice President of Cybersecurity Operations at Fortified Health Security The need for adequate cybersecurity has never been higher for the nation’s hospitals and health systems.

article thumbnail

Connected Medical Devices—the Next Target for Ransomware Attacks

Healthcare IT Today

The following is a guest article by Ryan Witt, Healthcare Cybersecurity Leader at Proofpoint The Internet of Medical Things, or IoMT, is a deep web of interconnected devices that increasingly plays a vital role in care delivery.