What is the Health Sector Cybersecurity Coordination Center? Cybersecurity threats in the health sector include vulnerabilities due to legacy systems, privacy protection, IT interoperability issues, and security breaches, to name a few. A source of cybersecurity guidance and information is the U.S. Department of Health and Human Services Health Sector Cybersecurity Coordination Center (HC3). HC3 […]
Category: IT Security
What are HIPAA Physical Safeguards? The Health Insurance Portability and Accountability Act of 1996 (HIPAA, PL104-191) was enacted to protect the privacy and availability of health insurance coverage and medical information. The law’s primary goals include protecting health insurance coverage for workers and their families in the event that the insured employee changes or loses […]
What are Productivity Tools? With so many productivity tools and applications available, employees are often keenly aware of alternative strategies for collaborating and getting work done. If employees feel that their cybersecurity practices and policies are creating obstacles and slowing them down, they are likely to look for ways around that by accessing other tools […]
Unified Threat Management
What is Unified Threat Management? Unified threat management (UTM) is an IT term that refers to a single security solution that provides multiple security functions at a single point on a network. A UTM solution may also be known as a next-generation firewall (NGFW), and may include features such as antivirus, anti-spyware, anti-spam, content filtering, […]
What is Networked Medical Device Cybersecurity? The Internet of Things (IoT) is the interconnection and communication between internet-enabled physical devices. The growth of such devices has been explosive, as smart devices such as wearables, sensors, phones, cars, appliances, and household gadgets are becoming increasingly prevalent in more and more aspects of daily living. The proliferation […]
What is AI in Cybersecurity? Artificial intelligence (AI) has both advantages and challenges in cybersecurity. AI is a powerful cybersecurity tool, but it does have its limitations, and cyberattackers work tirelessly to find new ways to leverage its power for their cybercrimes. AI improves cybersecurity in the following ways: Vulnerability management. Traditional vulnerability databases manage […]
Cybersecurity Policies and Planning
What are Cybersecurity Policies and Plans? To protect against cyberattacks, it is important for all organizations to develop cybersecurity plans and policies. Small businesses may think that such plans are overly elaborate or unnecessary, but every business with single computer or even one credit card terminal is vulnerable to serious cybersecurity threats and should have […]
Health IT
What is Health IT? Health information technology (health IT) involves the processing, storage, and exchange of health information in an electronic environment.1 Widespread adoption of health IT systems can help to improve health care quality, aid in the prevention of medical errors, potentially reduce health care costs, increase administrative efficiencies, streamline/decrease paperwork, and could expand […]
What is Secure Digital Transformation? The term digital transformation refers to the process of incorporating computer-based technologies into an organization’s products, processes, and strategies. A secure digital transformation can be thought of as an approach to digital transformation that focuses on processes and strategies that will ensure that the digital transformation will be carried out […]
What is RFID? Radio-frequency identification (RFID) refers to a technology where digital data encoded in RFID tags or smart labels are captured by a reader via radio waves. RFID technology embeds digital information into objects such as passports, security badges, car keys, apparel, and smart tags, which enable activities such as asset tracking, personnel tracking, […]