7 Must-Read Healthcare Cyber Security Articles, September 2020

September 29, 2020

Ransomware, Roadmapping, and Business Email Compromise headline this week's digest of healthcare cyber security articles.

Thanks for checking out the biweekly digest of Idenhaus healthcare cyber security resources. We have started breaking this into 2 posts - general Identity Management (published on Thursday) and Healthcare cyber security articles.

Peruse our resources for webinars, case studies, infographics, and educational videos. You can subscribe to receive the biweekly Healthcare Cybersecurity Articles, delivered Tuesdays at 8 PM ET.


7 Must-Read Healthcare Cyber Security Articles, September 2020


3 Key Considerations for Your Healthcare IAM Roadmap via Idenhaus

Learn how a Healthcare IAM Roadmap can set your organization on the path to a successful Identity Management implementation.


Hospital Ransomware Attack Results in Patient Death via HIPAA Journal

Until now there have been no confirmed cases of ransomware attacks on healthcare facilities resulting in the death of a patient, but when attacks cripple hospital systems and patients are prevented from receiving treatment for life-threatening conditions, such tragic events are sadly inevitable.


Top Healthcare Cybersecurity Resources from NIST, HHS, OCR, HSCC via HealthIT Security

Staffing challenges and budget constraints make it difficult for some healthcare entities bolster enterprise security. Resources from NIST, HHS, OCR, HSCC, and others can support the development of cybersecurity plans.


HHS Releases Updated Security Risk Assessment Tool via HIPAA Journal

Further enhancements have now been made based on feedback received from healthcare providers that have used the SRA Tool, including improvements to navigation throughout the assessment sections, new options for exporting reports, and enhanced user interface scaling.


13 Effective Roadmapping Techniques Every Product Manager Should Know About via Forbes Tech Council

Conducting a periodic roadmap refresh is essential for concept validation throughout the project life cycle, and it will realign the plan to the latest priorities.


The Growing Threat of Business Email Compromise via Idenhaus

Over the past three years, Business Email Compromise (BEC) schemes have caused at least $5.3 billion in total losses.


Reining In Cloud Spending? Try These 14 Smart Strategies via Forbes Tech Council

Cloud is an inherently more efficient operating model for data centers, but that is the tip of the iceberg of opportunity. Real cost savings come when we actively manage the cloud environment.



Check out our previous digest, 8 Must-Read Healthcare Cybersecurity Articles.


To receive the top Cybersecurity and Identity Access Management articles in your inbox every two weeks (Tuesdays 8 PM ET), subscribe to our biweekly Healthcare IAM and Cybersecurity Digest.


Follow @Idenhaus on Twitter and subscribe to our YouTube channel


Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!

forbes technology council

By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

More News