A recent study from the University of California Cyber Team funded by MedCrypt found that a few healthcare delivery organizations and vendors believe between 100 and 1,000 patients had adverse events from compromised devices. It’s a staggering number, especially when compared to the 80 percent of survey respondents that report risks in medical devices are
Health IT vendors do best when they have a deep understanding of the unique needs of their clients: the physicians, nurses and patients whose experience is shaped by the technologies they develop. Smart companies understand this, and many are making it a priority to fill their leadership positions with top talent drawn directly from hospitals
AWS has rolled out its new Amazon Neptune technology, a cloud-based tool that enables healthcare organizations and others to manage complex connected data for faster application development. The graph database service stores and navigates these datasets, allowing developers at health systems, life sciences companies and others to more easily make interactive graph apps, and query
In March, the Internet Engineering Task Force approved the Transport Layer Security version 1.3, the key function to enable HTTPS function on the web. On the surface, the new encryption model shores up network communications and provides substantially improved security features. As the new encryption model used to browse the internet, the TLS 1.3 standard
Vecna Technologies, a developer of patient self-service systems, has integrated its onsite patient check-in platform with Imprivata's PatientSecure identification technology. Through the partnership, hospitals and ambulatory practices will be able to use Imprivata's biometric palm vein scanning technology to securely ID patients who are checking in using Vecna's platform. There is now a thriving market for
Hospital information security teams considering a bug bounty program should know a few things before entering the endeavor. The phrase bug bounty, for the uninitiated, refers to programs where hackers are paid to detect and report back on network vulnerabilities. Bug bounty and vulnerability disclosure programs have been proven to deliver excellent results in finding
Legacy health IT poses both a significant threat and challenge to the sector, and the House Energy and Commerce Committee is calling on industry leaders to share insights about ways to begin overcoming infosec issues. The committee outlined its concern in an RFI posted Friday over outdated medical devices, especially after WannaCry. The May 2017
The Food and Drug Administration released its plan to improve medical device safety, which includes a reorganization of its medical device center and a Congressional plan to launch a public-private partnership focused on cybersecurity. The five-point plan released Tuesday outlines a plan to consolidate offices within its device center, which oversees pre- and post-market activities.
Last month, LexisNexis brought together 30 high-level executives, most of whom were CIOs from hospitals, nursing homes and health plans of all sizes from across the county to find out what data-related issues are weighing on them most as we get further into 2018. Ed Domansky, LexisNexis manager of media and analyst relations, and Erin
U.S. Department of Health and Human Services Chief Information Security Officer Chris Wlaschin will leave his role on March 31, just 15 months in the position. Centers for Medicare and Medicaid Services Chief Information Officer Janet Vogel will take his place. Reports have circulated regarding the circumstances around his departure, as it comes amid a
We and our partners use cookies on this site to improve our service, perform analytics, personalize advertising, measure advertising performance, and remember website preferences.Ok