June 19, 2017

Carter Groome • Chief Executive Officer

Patient Trust in the Age of Cyber Terrorism

Terrorism comes in many forms, all with somber outcomes.  Healthcare delivery organizations must realize that they too, are a potential target.  The trust and confidence that patients (customers) have in their care providers is under assault.  Covered entities must recognize that brand and reputation damage is real when it comes to breaches, med-jacking, and obstruction of care.  Your security posture is already shaping patient safety and will soon factor into competitive advantage, or disadvantage, if you are not effectively communicating your cyber attentiveness with your customers.

Read More

April 27, 2017

Carter Groome • Chief Executive Officer

In 2017, Healthcare Boards Still Detached When It Comes to Cyber Awareness

8 approaches to building a more cyber savvy healthcare board

The 2017 KLAS-CHIME Healthcare Provider Security Assessment notes that only 16% of healthcare organizations feel they have a fully functional security program and more than half of the organizations that are still developing their security program are spending less than 3% of their total IT budget on security.

The year of healthcare ransom attacks, 2016, was sure to awaken healthcare board’s to the possibilities, risks and organizational impact of being another victim of ever present malicious acts carried out on our industry. Information Risk Management funding is increasing at a sluggish clip, as evidenced by the recent KLAS-CHIME survey. To expedite an understanding of where additional budget allocations will have measurable impact, boards must first take the mantle of leadership by engaging both personally and strategically in cyber security. Read More

March 30, 2017

Toby Gouker • Vice President of Strategy

Best Practices of the Nation’s Top Systems 

First Cyber Health Solutions was fortunate to have the opportunity to learn recently what some of the nation’s leading healthcare systems are focused on in order to reduce their organization’s risk of incurring a security breach. We all know how daunting the task is of protecting our organization’s infrastructure from attack. It can be so overwhelming and complex that you don’t even know where to start. Why not follow the lead of some of our nation’s leading providers and focus first on the four areas listed below. Read More

March 4, 2017

Bob Hooper • Vice President of Sales

Reasonable Security for the Internet of Things

Whether you know it or not, your hospitals are being inundated on a daily basis with devices that want to communicate over your networks and the Internet. As you bring in and install new equipment (medical devices, payment processing machines, etc.), many of these devices have the ability to send and receive data over your network and outside of it, as they are part of this “Internet of Things”. This represents a point of vulnerability for your network. You need to take action to make sure that these devices are not going to be an entry point for a breach at your organization. Read More

February 27, 2017

Toby Gouker • Vice President of Strategy

Personal Healthcare Information Becomes Most Vulnerable Moving Throughout the Ecosystem

Healthcare system networks consist of multiple sources of data from multiple enterprise-level systems communicating in real time. This presents the healthcare cybersecurity professional with varying protection requirements. As these multiple types of data come together and transfer over to other systems, the data is accessed by many different users with varying analytics needs. Due to the urgent nature of information transfer in a healthcare environment, much of the data is transferred in clear text. Health care organizations face even greater risks if any part of a system is deployed in a cloud environment. When viewed from a patient perspective, speed of information flow is paramount. When viewed from an enterprise perspective, the importance of security becomes paramount. Organizations must protect sensitive customer, partner, and internal information and adhere to an ever-increasing set of compliance requirements. Read More

1 2 3