Cybersecurity

This channel page on cyber security includes news and new technology to prevent cyber attacks and hackers from gaining access to electronic medical recored (EMR) data, or illegallly accessing implantable wireless cardiac devices.

Clearing medical device cybersecurity requirements from DoD delivers even more safety assurance for customers
News | Cybersecurity | July 23, 2020
July 23, 2020 — Carestream Health’s ImageView software has received the Risk Management Framework Authority to Operate...
Advanced technologies such as AI, blockchain and continuous authentication to transform the connected era in 2030
News | Cybersecurity | April 15, 2020
April 15, 2020 — Frost & Sullivan’s recent analysis, The Future of Privacy and Cybersecurity, Forecast to 2030,...
#COVID19 #Coronavirus #2019nCoV #Wuhanvirus #SARScov2 U.S. Army Spc. Jonathon Hyde and Spc. Casymn Harrison from the 1434th Engineer Company, Grayling, Mich., Michigan National Guard, prepare patient rooms at TCF Regional Care Center in Detroit in advance of receiving COVID-19 patients, April 9, 2020 #COVID19 #Coronavirus #2019nCoV #Wuhanvirus #SARScov2

U.S. Army Spc. Jonathon Hyde and Spc. Casymn Harrison from the 1434th Engineer Company, Grayling, Mich., Michigan National Guard, prepare patient rooms at TCF Regional Care Center in Detroit in advance of receiving COVID-19 patients, April 9, 2020. The TCF Center in Detroit has been converted into a 970-bed alternative care facility for COVID-19 patients by the Federal Emergency Management Agency, in partnership with the U.S. Army Corps of Engineers and Michigan National Guard. (Photo courtesy of U.S. Air National Guard photo by Master Sgt. Scott Thompson)

Feature | Coronavirus (COVID-19) | April 15, 2020 | By Melinda Taschetta-Millane and Dave Fornell
In an effort to keep the imaging field updated on the latest information being released on coronavirus (COVID-19), the...
The webinar Avoid the Pitfalls – How to Make Sense of Security and Compliance in the Enterprise Imaging Landscape is sponsored by Change Healthcare.
Webinar | Cybersecurity | October 24, 2019
The webinar "Avoid the Pitfalls – How to Make Sense of Security and Compliance in the Enterprise Imaging Landscape"...
According to the National Association of County and City Health Officials, only 33 percent of the organizations plan against cybersecurity threats and initiate patient identity protection protocols.

According to the National Association of County and City Health Officials, only 33 percent of the organizations plan against cybersecurity threats and initiate patient identity protection protocols. 

Feature | Cybersecurity | October 08, 2019 | By Maxim Chernyak
As the National Association of County and City Health Officials state, healthcare breaches remained to be costly and...
The National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) is releasing a new practice guide — NIST Special Publication 1800-24, Securing Picture Archiving and Communication System (PACS)
News | Cybersecurity | October 04, 2019
The National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) is...
New Report Reveals Vulnerabilities of Internet of Things-enabled Healthcare Devices
News | Cybersecurity | August 29, 2019
August 29, 2019 — Use of the Internet of Things (IoT) is booming, with IHS Markit forecasting there will be 73 billion...
News | Cybersecurity | August 20, 2019
August 20, 2019 — Healthcare data breaches are currently being reported at a rate of more than one a day, according to...
ScImage Introduces PICOM ModalityGuard for Cybersecurity
Technology | Cybersecurity | August 07, 2019
August 7, 2019 — ScImage Inc. is bridging the gap between security and functionality with the introduction of the PICOM...
Podcast | Information Technology | June 26, 2019
Blockchain has been framed as an emerging disruptor in healthcare. This technology, initially developed for the...
Podcast | Cybersecurity | June 24, 2019
Medical imaging is ripe for the picking. Here’s why. Imaging and information systems are becoming ever more connected....
Studycast PACS Adds Two-factor Authentication to Improve Data Privacy and Security
News | Cybersecurity | June 12, 2019
June 12, 2019 — Core Sound Imaging announced the addition of two-factor authentication (2FA) to the security measures...
Image courtesy of Pixabay

Image courtesy of Pixabay

Blog | Cybersecurity | April 12, 2019
Sooner or later, the bad guys are going to figure out that healthcare IT is where it is at — and that imaging has a key...

This is an example of the Fujifilm REiLI artificial intelligence application for radiology, showing auto identification and quantification of a pleural effusion and fibrosis with color coding showing the areas of detected anomalies. 

Blog | HIMSS | March 05, 2019
Healthcare today is largely woven together with electronic medical record (EMR) systems, which has led to the rapid...
Amazon Comprehend Medical Brings Medical Language Processing to Healthcare
News | Artificial Intelligence | February 15, 2019
February 15, 2019 — Amazon recently announced Amazon Comprehend Medical, a new HIPAA-eligible machine learning service...
Office of the National Coordinator Releases Proposed Rule on Healthcare Data Interoperability
News | Information Technology | February 14, 2019
This story has been updated with additional information since its initial posting. February 14, 2019 — The Centers for...
Atos Launches First Comprehensive Cybersecurity Portfolio for Healthcare Organizations
Technology | Cybersecurity | February 12, 2019
February 11, 2019 — Information technology (IT) services provider Atos announced the launch of its first comprehensive...
Networked medical devices at a health care provider and their vulnerability to cyber attack, as seen in a screenshot of a display created by the Medigate platform

Networked medical devices at a health care provider and their vulnerability to cyber attack, as seen in a screenshot of a display created by the Medigate platform. Image courtesy of Medigate

Feature | Cybersecurity | February 12, 2019 | By Greg Freiherr
Cybersecurity is being defined by a kind of arms race. On one side are the hackers with malware, some off the shelf,...
Blog | Cybersecurity | February 04, 2019
Cyber hackers pose a worsening threat to radiology and the rest of medical imaging. This risk might be reduced, however...
Podcast | Cybersecurity | February 04, 2019
Cyber hackers pose a worsening threat to radiology and the rest of medical imaging. This risk might be reduced, however...