Preventing patient data leaks

patient data leaks

6 ways to protect patient data in your eClinical and digital health applications Patient data leaks is much more than patient privacy.  Patient data leaks require a more complete approach to threat mitigation of patient data leakage, availability and data integrity attacks. Since 2019, we see rapidly increased use of decentralized clinical trials, hybrid trials, […]

Are you neglecting security incident response in your DCT?

Let me ask you 3 questions.   If you answer Yes to all 3 – read this post, if not, then move on. Do you assume that your DCT  vendor has a security incident policy – based on the Web site? Are you VP R&D or CEO or regulatory and compliance officer at a drug company. […]

Dealing with DLP and privacy

Dealing with DLP and privacy It’s a long hot summer here in the Middle East and with 2/3 of  the office out on vacation, you have some time to reflect on data security. Or on the humidity.  Or on a cold beer. Maybe you are working on building a business case for DLP technology like Websense or Symantec or Verdasys, or Mcafee or Fidelis in […]

How to protect your personal information from medical data theft

Private, personal information can be bought and sold on the black market for as little as fifty cents to a dollar, according to a report from Fox Business. But personal medical information can go for much higher prices, creating a market for criminals looking to defraud insurance companies of exorbitant sums of money. Overall, about $40 […]

Out of control with BYOD in your hospital?

The number of bring your own device (BYOD) workplaces is increasing. Hospitals are certainly no exception with nursing staff, doctors and contractors bringing their own mobile devices into the hospital – and in many cases, jacking into WiFi networks in the hospital premises. With mobile access points via  your smart phone – you don’t even […]

The dangers of default passwords – 37% of Data Breaches Found to be Malicious Attacks

A malicious attack by malware or spear phishing on valuable data assets like PHI (protected health information) exploits known vulnerabilities  and one of the most common vulnerabilities in medical devices and healthcare IT systems is default passwords. “Researchers Billy Rios and Terry McCorkle of Cylance have reported a hard-coded password vulnerability affecting a wide variety of […]

Is your HIPAA security like a washing machine?

Is your HIPAA security management like a washing machine? Most security appliance vendors use fluffy charts with a 4 step “information risk management” cycle. It’s always a 4 step cycle, like “Discover, Monitor, Protect and Manage” and it’s usually on a circular chart but sometimes in a Gartner-style magic quadrant or on a line. It’s […]

How to use BI to improve healthcare IT security

Information technology management is about executing predictable business processes. Information Security Management is about reducing the impact of unpredictable attacks to  your  healthcare provider organization. Once we put it this way – it’s clear that IT and security and compliance professionals, as dedicated as they are to their particular missions – do not have common […]

Beyond the firewall

Beyond the firewall – data loss prevention What a simple idea. It doesn’t matter how they break into your network or servers – if attackers can’t take out your data, then you’ve mitigated the threat. Data loss prevention is a category of information security products that has matured from Web / email content filtering products […]

The connection between porn, fraud and data breaches

Are organizations with higher exposure to online porn and gambling more likely to have a higher incidence of data breach incidents? On the heels of recent Israeli credit card breach incidents, the reports of suspected fraud and money laundering at ICC CAL are bad timing at the very least for Israeli security and compliance. Last […]