
Email phishing is the primary attack vector for 90% of health data breaches.

Email phishing is the primary attack vector for 90% of health data breaches.

How the healthcare exec builds trust with Kaiser’s patients by being diligent with compliance and privacy.

New regulations need to address security concerns and promote ethical use of patient health data.

In part one of a series, we examine how health data sharing can go awry on social media.

New innovations created more entry points for cybercriminals to access personal health information.

The industry requires a more cost-effective approach to third-party risk management.

Unauthorized parties could wirelessly connect to the device and control insulin delivery.

Data Book discusses how leaders can ignore noise and embrace effective healthcare technology.

MedicareSupplement.com is using an unsecure, public database.

Physicians and healthcare executives need to take action independent of a bill to protect patients' health data.

With the healthcare industry at increased risk of cyberattacks, it is essential to develop a cybersecurity staff with a strong skill set.

The data were stored on an open and unsecured database that can be accessed by anyone.

An unauthorized individual gained access to two employees’ email accounts.

Ocular telehealth programs could help address the health and financial complications associated with diabetic retinopathy.

It would create the National Task Force on Data Protection, which would evaluate and provide input to address cybersecurity risks and privacy concerns.

To minimize risk, health IT teams must be aware of new methods being used to infiltrate networks.

Data Book details the demise of a dotcom startup and offers lessons for healthcare innovators.

3 steps that health systems can take to ensure their business associates are compliant.

A CynergisTek survey found a disconnect between the security needs of the organization and senior management buy-in.

How edge-to-cloud storage could benefit health systems.

An unauthorized user accessed the American Medical Collection Agency’s web payment page in May.

Data Book examines the story of Gail Zahtz and her dotcom startup, Working Weekly, for insights into healthcare’s digital transformation.

Jothi Dugar, chief information security officer at NIH Center for IT, said working in a silo isn’t good for an organization.

The EHR developer violated a HIPAA requirement by failing to conduct a comprehensive risk analysis.

Few organizations come out unscathed where ransomware is concerned. But in healthcare, the problem is particularly bad.