Search Tag: cyberattacks

Health Management

2022 08 Jul

As organisations become increasingly connected through technology, there is a rising threat of becoming collateral in cyberattacks. It is imperative to evaluate the security practices and stances taken within any third-party organisation involved. Key Points The NHS plans to launch 42 Integrated Care Systems (ICS) across England this year....Read more

IT Management

2021 12 Mar

A new report from The CyberPeace Institute analyses a variety of recent cyberattacks against the healthcare sector around the world, identifies the predominant threats and provides recommendations for improvement.   You might also like: ENISA has released cybersecurity guidelines for hospitals when procuring services,...Read more

IT Management

2020 26 Nov

Already burdened by the unprecedented challenges from the COVID-19 crisis, healthcare organisations also were hit by a barrage of significant security incidents – i.e. phishing, ransomware and data breaches – during the past 12 months, says a new HIMSS report.   You might also like: ‘Shielding’ Against Cyber Attacks   These cybersecurity...Read more

IT Management

2019 17 Sep

The Internet of Things (IoT) enables many of today's devices and equipment to work with such remarkable speed, accuracy and efficiency. Because of the numerous IoT-related benefits, people have a tendency to forget the fact that IoT devices are increasingly vulnerable to hacking attacks.   A new study serves as a timely reminder for hospitals and health...Read more

IT Management

2017 24 Jul

The "dark web" is something hidden from most users of the internet. This is because the dark web lies within what is known as the deep web – a part of the internet not indexed by search engines and without registered websites and domains. Special software is required to access the dark web, which is especially designed not to allow one to find identities,...Read more

IT Management

2017 12 Jun

Healthcare providers need to step up measures to protect health data as medical devices remain vulnerable to cyberattacks, according to tech experts. “Ransomware attacks against medical devices are going to continue to grow like crazy in the coming months and years because most of the connected medical devices are not being secured properly,” said...Read more

ICU Management

2017 24 May

Recent cyberattacks have left public authorities reeling at the relative ease with which a malign individual or organisation can bring about widespread disruption of services. The main target of recent attacks in the health sector was the National Health Service in the UK. The fact that the problem boiled down to a software fix or ‘patch’ which had...Read more

IT Management

2017 18 Apr

The lack of standardisation regarding security frameworks – and the implementation of those frameworks – is the biggest weak spot in cybersecurity today, according to a security expert with the FBI. See Also : No Time to Lose: Get Serious About Cybersecurity Education Malcolm Palmore, FBI assistant special agent in the cyber division in San...Read more

IT Management

2017 02 Jan

Amid criticism that it was not doing enough to address the cyber vulnerabilities in medical devices, the U.S. Food and Drug Administration has issued guidelines on how manufacturers can protect their products against cyberattacks. According to the guidelines, manufacturers must build cybersecurity controls into medical devices during the development...Read more

Health Management

2016 27 Feb

Change content default valueRead more

Executive Health Management

2016 27 Feb

Recent Hospital Virus Attacks Trigger Call to Redefine IT Security Recent cases of cyber-attacks, intentionally breaching the security infrastructures of hospitals around the globe, have raised serious questions about how to tackle such malicious invasions. no matter if it was for financial gain or the simple thrill of having broken through the...Read more

IT Management

2015 20 Oct

Many healthcare professionals believe criminals are increasingly targeting health IT systems; however, only 10 percent or less of healthcare organisations' IT budget goes toward cybersecurity and protecting their patients' highly sensitive information, according to a new study from Trustwave. The survey was conducted to measure the challenges facing...Read more

ICU Management

2015 29 Sep

A new compendium of strategies to enhance survival of victims from mass casualty events has been released as a supplement to the Bulletin of the American College of Surgeons. The report, "Strategies to Enhance Survival in Active Shooter and Intentional Mass Casualty Events: A Compendium", contains recommendations from the Joint Committee to Create...Read more

IT Management

2015 12 Sep

With cyberattacks on the rise, a California-based security vendor now provides "deception technology" to better protect IT systems. The technology is used to detect bots and APTs inside the network, data centre, and cloud before the data is breached. Tech startup Attivo Networks specialises in creating a complete “site of deception” inside a network....Read more

IT Management

2015 06 Sep

Eighty-one percent of healthcare executives say their information technology has been compromised by cyberattacks during the past two years, according to a recent survey by KPMG. In addition, only half of those executives say they are ready to defend against future attacks. These attacks may put sensitive patient data at risk of exposure, the KPMG report...Read more

IT Management

2015 04 Jul

Healthcare providers take the issue of cybersecurity seriously, and most of them (87 percent) have implemented new technology and personnel to guard against cyberattacks, results of the 2015 HIMSS Cybersecurity Survey show. Two-thirds of those surveyed also indicated that their organisations had experienced a significant security incident recently....Read more

IT Management

2015 11 May

Researchers at University of Washington have conducted a series of experiments revealing vulnerabilities of next generation teleoperated surgical robots. The aim was to test how some forms of cyberattacks could hijack remotely-controlled operations in the future and to make those systems more secure. Use of teleoperated robots, which are controlled...Read more