This checklist describes the top vulnerabilities we have found in healthcare organizations along with the action items that should be taken to address them.
Home » Breach Prevention & Response » The Top 20 Security Vulnerabilities Healthcare Organizations Should Address
Error - something went wrong!
Other content in this Stream
AI, IoT, Medical Devices Top Health Cybersecurity Predictions for 2019
Reduce Employee Email Risk by Taking Decisions Away from Users
HHS Seeks Feedback on Potential HIPAA Changes
Web Portals: More Breaches Illustrate the Vulnerabilities
Another State Announces a HIPAA Breach Settlement
Bankers Life Affected By Hacking Incident
Marti Arvin, CynergisTek’s VP of Audit Strategy, recently sat down with Marianne McGee of Healthcare Info Security and exchanged some comments about yet another large breach caused by a hacking...
What Can Healthcare Learn from the Marriott Data Breach?
Phishing Scams in Healthcare: A Persistent Threat
Another Healthcare Website Security Issue Revealed
Why Contingency Planning for Vendor Data Disputes Is Critical
Attack on Billing Vendor Results in Massive Breach
A Strong Message on Improper PHI Disclosure to News Media
Medical Devices: The Risks Go Beyond Security
Watch our latest webinar on medical device security hosted by David Finn, EVP of Strategic Innovation at CynergisTek, Cory Blacketer, Information Security Consultant – Medical Device Security at Cyner
CynergisTek and CHIME Collaborate on Healthcare Cybersecurity Program Research
In November of 2018, CynergisTek collaborated with CHIME to examine the top healthcare cybersecurity challenges for CIOs with its survey, “Addressing the Security Gaps in Health IT.” Through most...
3 Major Misconceptions About Managed Print Services in Healthcare
Breach Settlement Has Unusual Penalty
Mobile Devices in the Healthcare Academic Medical Center: Why Are They So Difficult to Control?
In today’s healthcare environment, mobile devices are rampant. Controlling the nature and method of data stored on these devices is not easy in most industries – and mobile devices in the...
PODCAST: Managing the Aftermath of a Cyber Incident with a Strategic Incident Response feat. David Finn
Cyber Incidents in Healthcare: How Much Would You Pay?
Medicaid Data Breach Trends: An Analysis