Search Tag: cybersecurity

Cardiology Management

Protecting cardiac devices against hacking

2018 14 Mar

Medical devices have been targets of hacking for over a decade, and this cybersecurity issue has affected many types of medical devices. In light of recent incidents involving the potential for hacking of cardiac devices (i.e., pacemakers and defibrillators), the American College of Cardiology’s Electrophysiology Section Council has published a paper... Read more

IMAGING Management

Sectra's Nine-month Interim Report: Sectra Tops Customer Satisfaction for Fifth Consecutive Year

2018 11 Mar

International medical imaging IT and cybersecurity company Sectra reported increased order bookings and net sales compared with the year-earlier period. The earnings trend for the Group as a whole was stable. Sectra's financial focus is to increase its operating profit per share while maintaining its operating margin, and Sectra's financial performance... Read more

IT Management

FT Cyber Security Summit

2018 07 Mar

Find FT Live on Social Media     Read more

IT Management

Medical device security: keep calm and stop clicking

2018 13 Feb

Cybersecurity of medical devices is on top of ECRI Institute's 2018 list of top 10 challenges facing healthcare. And experts from the independent nonprofit organisation offer practical guidance for its member hospitals to protect medical devices against security threats.“We really need to make sure that there are appropriate resources for the healthcare... Read more

Health Management

Committing to the future of medicine

2018 25 Jan

The future is not so far off as a new book on future healthcare shows A new book released by Jacobs Institute has its finger on the pulse of the lightning-speed changes happening in healthcare and how stakeholders will need to adapt to stay ahead.Peering into the future of healthcare is less about predictions and more about implementing systemic change... Read more

Executive Health Management

Insiders cause most data security breaches

2017 03 Dec

The latest Protenus breach barometer shows this year's security trend remained true for October – i.e., at least one breach occurs in the healthcare sector each day. That month a total of 37 breaches were reported, based on data Protenus gathered from the U.S. Department of Health and Human Services’ Office of Civil Rights, as well as research from... Read more

IT Management

Common cybersecurity weak spots and how to tackle them

2017 01 Nov

Maintaining the safety and protection of IT systems that keep important health information requires discipline. This is especially true in this era of the Internet of Things (Iot), when more and more eHealth devices and other gadgets get connected to a provider organisation's IT system or network. Thus, ensuring that these connected devices are secure... Read more

IT Management

Solution for cybersecurity staff shortage

2017 25 Sep

Amidst increasing incidents of cybercrime, many employers are looking to expand their cybersecurity teams this year to better protect their systems against threats. In the healthcare industry, employers plan to expand staff by 20% or more, according to the (ISC)2 Global Information Security Workforce Study (GISWS).    However, such expansion plans may... Read more

Health Management

Cyber infection control: Time to take it seriously

2017 19 Sep

Both infection control and cybersecurity support the whole care process, but why do we treat themso differently? In 1847 the father of infection control, Ignaz Semmelweis, took a position running maternity services in a Vienna hospital. During his time there he observed that women cared for by physicians were more likely to die (13-18%) from infection... Read more

IT Management

Cybersecurity Report: New Threats

2017 05 Sep

HIMSS Director of Privacy and Security Lee Kim's latest monthly report on cybersecurity features a very interesting finding, and email users – that means most of us – should take note of it. There's a new cyberattack technique, called ROPEMAKER, that allows attackers to modify or edit the content in an email after it has been sent to the recipient.... Read more