Privacy & Security
Pharmacies nationwide are reportedly experiencing delays in filling prescription orders due to the cyberattack.
<p>One closed and declared bankruptcy because, while it was able to deliver care, it was unable to do billing, says Iain Paterson of WELL Health Technologies, who, with Yotam Segev of Cyera, discussed the benefits of moving to the cloud.<br />
</p>
<p>The threat surface is increasing for bad actors, which makes organizations feel outgunned, says Richard Staynings, chief security strategist at Cylera.</p>
<p>Encryption provides verification of data to keep it HIPAA compliant and available only to authorized users, says Dan Draper, founder and CEO of CipherStash.<br />
</p>
Ardent proactively took its network offline, suspending user access to its IT applications, including corporate servers and Epic software.
<p>Smaller hospitals are having to make financial resource decisions between cybersecurity and investment in patient care devices such as CT scanners, says Wes Wright, chief healthcare officer of Ordr.<br />
</p>
<p>Engage clinicians and other stakeholders who need to own the project, says Dr. Tamara Sunbul, medical director of Clinical Informatics, who helped implement Epic at Johns Hopkins Aramco Healthcare.<br />
</p>
<p>Over the last four or five years, incidents have changed from one-off events to criminal conspiracies, says K&L Gates partner Gina Bertolini, a healthcare regulatory attorney.</p>
<p> </p>
<p>Alisa Chestler, chair of the data protection, privacy and cybersecurity team at Baker Donelson, questions whether $20 million in annual funding from a new Behavioral Health Information Technology Coordination bill is enough to move the needle.</p>
<p> </p>
<p class="MsoNoSpacing"><span style="font-size:11pt"><span style="font-family:"Calibri",sans-serif">Mass General Brigham has a digital team strategy with one focus on reducing the documentation burden, says CIO Dr. Adam Landman.</span></span></p>