cyberattack

Why ophthalmologists are easy prey for cybercriminalsA perfect storm is brewing that may make ophthalmologists and office staff, with networked equipment, easy targets for cyber criminals. In a matter of days, cyber criminals can infect computers around the world. Sure, you can pay the ransom, but HIPAA fines and consultant fees, recovering from the damage to your reputation, loss of patients, and all the time and energy lost could bankrupt your practice.
How to protect equipment from ransomware attacksThe devices that reveal the inner workings of the human body can also expose healthcare organizations to lethal attacks by hackers
6 critical actions practices must take for better cybersecurityAfter more than a year at work, the Health Care Industry Cybersecurity Task Force in June issued its report on what providers must do to better safeguard patient data.
4 ways to protect your practice from ransomware attacksAs ransomware attacks multiply, cybersecurity has become a top concern among healthcare professionals. What are the best ways to stop these attacks before they occur?
How to develop a culture of cybersecurityWhen it comes to identifying a practice’s top cybersecurity threat, look beyond the hackers and email scammers.
Four ways health execs can help their organizations mitigate cyberattacksHealthcare executives are starting to realize that preventing cyberattacks is not just a task for their IT departments and third-party security vendors.
10 ways to improve patient data securityMore than 80% of security breaches result from human errors
How will health IT trends evolve in 2017?
How will health IT trends evolve in 2017?Waves of predictions about the health IT industry roll in at the end of every year. But how accurate were they in 2016?
6 steps to survive a ransomware attack
6 steps to survive a ransomware attackHere are the six tips I learned to help survive a ransomware attack.
Ransomware attacks present growing threat for hospitalsCyberattacks based on ransomware—hacking into a computer system and holding it hostage until the victim pays to regain access—are on the rise.