MedStar attack apparently enabled by unpatched software
Attackers who find vulnerable servers can deploy ransomware without any action on the part of users in the targeted organization.
Attackers who find vulnerable servers can deploy ransomware without any action on the part of users in the targeted organization.
In the latest round of security recommendations for the Nationwide Health Information Network (NwHIN), the Privacy and Security Tiger Team (a workgroup of the federal Health IT Policy Committee that advises the National Coordinator for Health…
In its Monthly Report to Congress On Data Incidents for the month of September (the exact time period noted on the report is August 30 – October 3, 2010), the Department of Veterans Affairs (VA) describes…
With just over a year having passed since the health data breach notification rules mandated by the Health Information Technology for Economic and Clinical Health (HITECH) Act went into effect, and interesting contrast has emerged between…
The Office of the National Coordinator for Health Information Technology (ONC) within the Department of Health and Human Services (HHS) has announced plans for a public roundtable discussion on personal health records (PHRs) to be held…
The North Carolina Healthcare Information and Communications Alliance (NCHICA) just released a white paper entitled “Privacy and Security Implications of Meaningful Use for Health Care Providers” that reflects the results not only of an analysis of…
HealthcareInfoSecurity.com‘s Howard Anderson and others last week covered an indictment filed in Pennsylvania against a man who allegedly used his authorized access (as a hospital employee) to patient records to steal names, dates of birth, social…