This Week Health

Interviews in Action

More
Browse by Topic
Cybersecurity
AI/Machine Learning
Clinician Burnout
Cybersecurity
Vulnerability in VMware product has a severity rating of 9.8 out of 10
Read to Episode
AI & Machine
Learning
Newsday: From AI Displacements to Database Debates: A Deep Dive with Charles Boicey
Read to Episode
Clinician Burnout
Podcast by Topic
R25 - Podcasts Category Filter-2
  • All
  • Leadership (675)
  • Emerging Technology (502)
  • Security (311)
  • Patient Experience (298)
  • Interoperability (297)
  • Financial (289)
  • Analytics (182)
  • Telehealth (175)
  • Digital (164)
  • Clinician Burnout (160)
  • Legal & Regulatory (141)
  • AI (106)
  • Cloud (92)
In the News

Who is Responsible for Enforcing the HIPAA Security Rule?

August 15, 2024

The enforcement of the HIPAA Security Rule is primarily overseen by HHS’ Office for Civil Rights (OCR), although other federal agencies, State Attorneys General, and organizations’ own HIPAA Privacy Officers often play more proactive roles in enforcement actions. OCR investigates a minimal number of breach notifications, typically less than 1%, leading to few enforcement actions. Violations requiring attention by other agencies, like the Department of Justice or HHS’ Office of Inspector General, often involve criminal actions or potential federal program exclusions. State Attorneys General may also impose civil monetary penalties for data breaches. While HIPAA Privacy Officers enforce compliance within organizations, the potential for future indirect enforcement by CMS through federal health program conditions signifies a need for stringent voluntary compliance to avoid penalties and exclusions.

Who is Responsible for Enforcing the HIPAA Security Rule? The HIPAA Journal

Read More

Lawmaker calls for increased penalties for ransomware attacks against Michigan hospitals

August 15, 2024

State Representative Donni Steele has called for increased penalties for ransomware attacks targeting Michigan hospitals after a cyber attack impacted McLaren's IT and telephone systems. Currently, hacking penalties in Michigan max out at five years in prison, while ransomware possession carries up to three years. Steele argues these punishments are insufficient given the disruptions to critical medical services, such as those experienced by McLaren and Ascension Healthcare in recent months. Both healthcare systems faced significant operational issues due to cyber attacks, with Ascension confirming potential exposure of patient data. Steele is advocating for stronger legislative measures and enhanced law enforcement collaboration to combat these cyber threats effectively.

Lawmaker calls for increased penalties for ransomware attacks against Michigan hospitals The Detroit News

Read More

Microsoft Says Delta’s Technology Outdated, Likely Contributed to Slow Recovery

August 15, 2024

Microsoft has stated that Delta Air Lines' slow recovery from a recent network outage was likely due to outdated technology. The airline experienced significant delays and cancellations, which Microsoft attributes to their reliance on legacy systems that are less resilient to disruptions. This highlights the growing need for companies to modernize their IT infrastructure to improve reliability and response times.

Microsoft Says Delta’s Technology Outdated, Likely Contributed to Slow Recovery The Wall Street Journal

Read More

After the Dust Settles: Post-Incident Actions

August 15, 2024

Post-cybersecurity incident, organizations must undertake detailed post-mortem evaluations to understand the attack's specifics, identify vulnerabilities, and improve future incident responses. This analysis includes reviewing attack vectors, timelines, and the effectiveness of the responses. It is essential to share the findings and learnings within the organization and with the wider cybersecurity community to enhance collective knowledge and defenses. Feedback loops should be established to continuously improve security measures. The goal is to build a culture of continuous learning and collaboration without attributing blame, ensuring timely and constructive reviews post-incident to adapt to evolving cyber threats effectively.

After the Dust Settles: Post-Incident Actions publication

Read More
View All
Insights by Kate Gamble
View All
Our Partners

Premier

Diamond Partners

Platinum Partners

Silver Partners

This Week Health
Healthcare Transformation Powered by Community
Looking to connect or attend events? Visit our sister organization, 229 Project
Click here.

© Copyright 2024 Health Lyrics All rights reserved