It’s that time of year to reflect on 2019. While we were doing our annual analytics check, we realized the majority of our readers were most interested in our privacy and security-related blogs. To be honest, we weren’t surprised – smart healthcare organizations always keep privacy and security top of mind. We wanted to make it easy by giving you some of our best privacy and security resources from 2019, so you can feel confident going into 2020.
We just wrapped up the month of October supporting National Cybersecurity Awareness Month and the emphasis focused on the mantras of Own IT, Secure IT, Protect IT as it relates to your personal and patient data. As a leader in Patient Privacy, we were proud to participate in National Cybersecurity Awareness month, and share many educational resources throughout the month. Each week during the month we focused on a different topic to give you tips for what hospital leaders (and in some cases, you personally) can do to improve cybersecurity protection.
As you may be aware, October is National Cybersecurity Awareness Month and the emphasis focuses on the mantras of Own IT, Secure IT, Protect IT. In previous weeks, we've focused on "Own IT" as it relates for Remote Access Security, "Secure IT" as it relates to multi-factor authentication, and "Protect It" as it relates to HIPAA violations. This week, I want to focus again on "Protect It" and how it relates to protecting data from scammers or hackers.
October is National Cybersecurity Awareness Month and the emphasis focuses on the mantras of Own IT, Secure IT, Protect IT. In last week's blog, I focused on "Own IT" as it relates for Remote Access Security. This week I will focus on "Secure IT". A key to securing it (and in this case, "it" refers to Protected Health Information) is realizing that there are tools for healthcare IT available to help us live and work in a mobile society.
October is National Cybersecurity Awareness Month and the emphasis focuses on the mantras of Own IT, Secure IT, Protect IT. This is the first in a series of weekly blogs this month where we will be diving into these topics, specifically in how they relate to Healthcare IT. Today, I will be expanding on the “Own It” mantra as it relates to securing remote access to your network with remote vendors and employees.
Let me begin by saying, I live on the Atlantic coast, just north of Jacksonville, FL. Because it’s hurricane season in this area, I have been keeping a keen eye on hurricane updates. Recently, I have tracked and monitored Hurricane Dorian and the impact it might have on my family.
Each week we read about the number of breaches and cybersecurity attacks that cripple healthcare organizations. Now we are seeing articles and research about the impact cybersecurity breaches and attacks are having on the financial health of healthcare organizations.
I grew up being told “there are consequences to your actions young man!” Sometimes those consequences I faced were small and moved past me without much fanfare, while others seemed to knock me down. Often, these consequences came from wrong choices, and at times they came when I made the right choice but didn’t put my heart into it and do enough. One thing I can attest to is those consequences, great or small, helped make me a better person today.
I think I want to stay in bed…Have you ever had one of those weeks when everything went wrong all week and every day was a Monday? The week of May 13 th was one of those weeks for IT and cybersecurity. As I was reading throughout the week, I found articles about:
The Two Tales of Remote Access Security: Protection from Hackers, and Meeting Regulatory Requirements.
It’s all over the news - a new healthcare breach here, a new healthcare IT study there, that talks about how healthcare IT security needs to be a focus in 2020. In this era of COVID-19, unfortunately hackers are taking advantage of this situation and we are seeing an increase in hacking attempts and phishing scams.