Network-connected medical devices are transforming how healthcare organizations are able to deliver patient care. These devices are not often manufactured with security...
It is vital for IT executives to gain buy-in from senior management or the Board in order to attain needed funds and support for projects. Oftentimes, these audiences...
What would you do if one of your third-party vendors compromised your patients’ health information? Not your problem, right? Wrong. Even though the third party potentially...
The number of devices connected to a single hospital network is overwhelming. For example, a typical hospital has 10 pieces of biomedical equipment for every licensed...
This checklist describes the 20 most common security vulnerabilities that we have found in healthcare organizations along with the action items that should be taken...
Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those...