Staff compliance, fast updating are key to healthcare facility cybersecurity

American Health Information Management Association developed a list of best practices


Staff compliance and fast updating are the keys to healthcare facility cybersecurity, according to an article on the Lehigh Valley Business website.

American Health Information Management Association (AHIMA) developed a list of 17 best practices regarding a hospital cybersecurity plan. According to the report, immediately updating systems when patches are released by the manufacturer is critical.

“A lot of the attacks could be prevented if people were keeping their systems up-to-date with the patches,” Kathy Downing, AHIMA’s vice president of information governance and informatics, said in the article.

In addition according to John Riggi, senior adviser for cybersecurity and risk for the American Hospital Association in Chicago, the staff of a hospital can either be their best defense against cyberthreats or the weakest link. Hackers target employees through phishing emails or other social engineering tactics.

Read the article.

 

 



June 6, 2018


Topic Area: Information Technology


Recent Posts

17 Million Patient Records Stolen in PIH Health Ransomware Attack

A ransomware attack halted operations across three of PIH’s hospitals.


Holidays are Prime Times for Healthcare Cyberattacks

A study found that 86 percent of organizations that experienced ransomware attacks were targeted on a holiday or weekend.


Hartford Healthcare Forms Partnership to Open Health Equity Clinic

The new clinic will open in January 2025.


UCHealth Reveals Plans for Memorial Hospital North Expansion

Construction on the patient tower is slated for 2026 with a projected opening to patients in 2029.


What Are 'Hospi-tels'?

Hospitals and hotels are partnering to better cater to patients and families.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.