by medicaltechont | Feb 28, 2022 | Cloud, data, Electronic Medical Records, hackers
Hacking incidents still dominate the major health data breaches being reported to the U.S. Department of Health and Human Services in the first months of 2022 by far, with only one other type of breach appearing on the federal tally so far this year.
McQuiggan counseled all organizations, including healthcare providers, to reduce the risk of compromise by investing in their employees and providing an engaging cybersecurity training program that will help them spot social engineering scams, such as phishing emails.
“Organizations that suffer a data breach discover the costs to recover have a significant financial impact,”
Click here to read more.
by medicaltechont | Oct 22, 2016 | Cloud, Hardware, Security, Software, Technology
Cyber-warfare – Yesterday a massive DDoS attack took down a large portion of the Internet leaving sites offline or at dial-up speed. At first it was thought that the issue was neutralized, however as midday approached another massive attack rendered major sites unavailable. The attack was targeted at a major domain DNS server provider, however the ramifications to the attack were seen to be much more substantial. Sites like Twitter, Netflix, Reddit, PayPal, Kijiji, Pinterest and even the entire PlayStation Network were down or struggling. This was only a small portion of the list. At the moment we still do not know who initiated the attack, however it’s thought that IoT (Internet of Things) devices may actually be the an accessory to the crime. With so many providers affected we now need to take time analyze how this may affect online EMR providers in the future. Can IoT malware attacks and other types render cloud based applications offline? How does this affect patient care?
To read more about the attack that shutdown a large portion of the Internet click on the links below:
https://www.wired.com/2016/10/internet-outage-ddos-dns-dyn/
https://threatpost.com/mirai-fueled-iot-botnet-behind-ddos-attacks-on-dns-providers/121475/
by medicaltechont | Oct 15, 2016 | e-Health, Ontario, OntarioMD, Privacy
Interesting article written in the Huffington Post this week regarding EMR and changes in the medical software landscape. Seems that there is a lot being written on the potential use of patient data. As quoted in the article “value assessment of Ontario’s digital health assets and all related intellectual property and infrastructure.” This is starting to make some question the long term plans for your personal medical data in Ontario.
Is Selling Your Health Data The Liberals’ Budget-Balancing Plan?
Last week, Ontario’s Liberal Government announced plans to consider monetizing the data stored by eHealth Ontario. In an open letter to Premier Kathleen Wynne’s Business Adviser Ed Clark, Health Minister Eric Hoskins asked him to do a “value assessment of Ontario’s digital health assets and all related intellectual property and infrastructure.” Additionally, he asked that Clark look at ways to “maximize the value of these assets.“
This type of data is a treasure trove for private businesses and would be worth a lot of money to them. Just look at how Facebook has been able to monetize the personal information it has stored on all its “friends.”
But wait, isn’t your personal health data stored at your physician’s office, not at eHealth?
Read more online at http://www.huffingtonpost.ca/sohail-gandhi/ehealth-monetization_b_12431972.html
by medicaltechont | May 2, 2016 | Cloud, Security, Technology
Although many enterprises have user access security measures in place, both on-premises and in the cloud, they may not have enough, warned the Cloud Security Alliance in a new report.
The report, “Identity Solutions: Security Beyond the Perimeter,” was released April 21. It’s based on 325 online interviews conducted worldwide by the CSA. The findings revealed “no significant differences in security solutions used” between respondents who reported a breach and those who didn’t, according to the report, which was sponsored by Centrify, maker of identity security tools for the enterprise.
When asked in the CSA survey if their company had ever reported a data breach, 17% of respondents said yes, 26% said they were unsure, and 57% said no. Of those who said their company had reported a breach, 22% said the breach was caused by compromised credentials.
Read more at http://www.informationweek.com/cloud/identity-management-where-cloud-security-falls-short/d/d-id/1325238
by medicaltechont | Apr 23, 2016 | Cloud, Security, Technology
With the “Cloud” getting ever more prevalent it is increasingly coming under more attack. It has become the option for Malware creators who want to create havoc. The question is “how safe is your data from online predators”? Will you become liable for a breach? Read this great article from Forbes magazine below.
How To Determine If You Can Trust Cloud Security
Will 2016 be the year security stops being a reason to avoid public clouds? Because, face it, by now established cloud vendors have likely invested more in security than you can hope to duplicate in-house. But when you’re used to pulling your own security levers, how do you let go of some of that control?
What we need is the cloud security version of a trust fall.
You may have taken part in this team-building exercise: You fall backward into the arms of a coworker while trusting that they’ll catch you before your khakis-clad behind hits the ground. It’s easier to take that plunge when your colleagues have given you reasons to trust them: They step up when you need a hand at work, they have built a solid reputation, they have your back when things go awry.
Read more at http://www.forbes.com/sites/oracle/2016/04/19/how-to-determine-if-you-can-trust-cloud-security/#11c297406c78