Skip to content

Category: HealthCare

Read the latest articles and news from the world of cybersecurity.

How to complete your Security Risk Analysis for MIPS

MIPS or the Merit-based Incentive Payment System is a performance-based reimbursement program under Medicare, developed by the Centers for Medicare & Medicaid Services (CMS) to reward healthcare providers for quality,
Read More

Complying with HIPAA

The Health Insurance Portability and Accountability Act (HIPAA), enacted in 1996, is a U.S. federal law designed to protect PHI and other sensitive patient health information. HIPAA establishes the standards
Read More

What is the HIPAA Security rule?

The HIPAA Security rule applies to covered entities, business associates, subcontractors – anyone or any system with access to confidential patient data. Every organization in the healthcare delivery ecosystem must
Read More

Security Considerations for AI in Radiology

As the integration of Artificial Intelligence (AI) into radiology continues to advance, it brings forth a multitude of opportunities to enhance diagnostic accuracy, streamline workflows, and improve patient outcomes. However,
Read More

SOC 2 for Radiology

While a SOC 2 report is often associated with technology companies and cloud service providers, its principles are equally applicable and beneficial to organizations in the healthcare sector, including radiology
Read More

Cybersecurity and Compliance Best Practices for Radiology

In the rapidly evolving landscape of healthcare, the integration of technology has become indispensable, particularly in the field of radiology where digital systems are fundamental to diagnosis and treatment. However,
Read More

Benefits of Pen Testing for Radiology

Radiology organizations handle sensitive medical information and rely heavily on secure digital systems to store and transmit patient data. With the increasing prevalence of cyber threats, ranging from ransomware attacks
Read More

Pen Testing for Radiology

Penetration testing, often referred to as “pen testing” or “ethical hacking,” is a proactive security assessment approach used to identify vulnerabilities and weaknesses within a computer system, network, or application.
Read More

Can you have a Ransomware attack if you are HIPAA-compliant?

The short answer: Yes   The in-depth answer: The Health Insurance Portability and Accountability Act (HIPAA) sets the minimum standards for protecting sensitive patient health information (PHI). The Department of Health
Read More

Sources of Ransomware Attacks on Healthcare Systems

A cohort study published in The Journal of the American Medical Association in December of 2022 revealed that Ransomware attacks targeting Healthcare delivery organizations more than doubled from 2016 to
Read More