Cybersecurity is becoming a greater challenge for the healthcare industry, costing the system $6 billion annually. Since medical information contains patient Social Security numbers, addresses and insurance information, hackers seek out the places that store all of this information together: hospitals.
Healthcare data breaches accounted for 43 percent of all breaches in 2014. More recently, high-profile breaches at CareFirst, Anthem and Premera Blue Cross highlighted the vulnerability of health insurers in addition to hospitals. Industry leaders are trying to figure out ways to strengthen the security systems in order to keep patient information under stronger electronic lock and key.
Here are some healthcare security leaders you may consider following on Twitter:
With the Rise of AI, What IP Disputes in Healthcare Are Likely to Emerge?
Munck Wilson Mandala Partner Greg Howison shared his perspective on some of the legal ramifications around AI, IP, connected devices and the data they generate, in response to emailed questions.
Colin Konschak (@ColinKonschak) is a managing partner and the CEO of the healthcare consulting firm DIVURGENT.
Rising Healthcare System Cyber Attacks Cost $6B Annually http://t.co/FJQQjzGCj1 via @cjournal #cybersecurity #divurgent
— Colin Konschak (@ColinKonschak) May 11, 2015
Frank Baitman (@frankbaitman) is the chief information officer at the U.S. Department of Health and Human Services. He specializes in business and technology strategies.
Instead of Snow Days, companies in the future will have #Cyber Days when under attack – Roland Cloutier #MITCIO #cybersecurity
— Frank Baitman (@frankbaitman) May 20, 2015
Danika Brinda (@DanikaBrinda) is an assistant professor at The College of St. Scholastica and an HIM professional. She helps healthcare organizations make sense of technology.
Beacon Health System alerting patients of security breach #HIPAA #phishing http://t.co/pqkMmziyAE
— Danika Brinda (@DanikaBrinda) May 26, 2015
David Houlding (@davidhoulding) is the healthcare privacy and security lead at Intel Corporation. His role includes defining strategies, roadmaps, reference architectures, solution incubation, prototypes, pilots, and sales and marketing field support for the Health and Life Sciences sector.
https://twitter.com/davidhoulding/status/598536968515887105
C. Bryan Ivey (@bryan_ivey) is the team lead for the X-Force Threat Analysis Service (XFTAS) team at IBM. He writes the newsletter for XFTAS which includes team written assessments highlighting security related events.
https://twitter.com/bryan_ivey/status/603629379567132672
Daniel J. Solove (@DanielSolove) is a Law Professor at George Washington University Law School. He is an expert in information privacy law and founder of the privacy and security training company Teach Privacy.
Hackers of IRS used personal data exposed in breaches at other entities to answer authentication questions http://t.co/ryBiO2Movu
— Daniel J. Solove (@DanielSolove) May 27, 2015
Lisa Gallagher (@lgallagherHIMSS) is the vice president of technology solutions at HIMSS
#HIMSS15 Shadow IT: "unsanctioned apps in enterprises." "It's not just the end users, your departments do this." #HITSecurity at CCCC.
— Lisa Gallagher (@LGallagherHIT) April 14, 2015
HD Moore (@hdmoore) is the chief research officer at Rapid 7, an IT security company that performs security assessments to identify vulnerabilities in network, hardware, software, Web and database portions of businesses.
https://twitter.com/hdmoore/status/599634376238829568
Health IT Security (@HealthITsec) is a group of IT security and medical professionals who want to raise awareness and improve security in health organizations. Although we have focused on individuals in this post, we thought it was worth including this group since it is particularly relevant.
ISMA Data Breach Reportedly from IT Head’s Stolen Devices http://t.co/sqKJn8lDnf
— Health IT Security (@HealthITsec) May 13, 2015
Photo: Getty