Episoder
-
Commitment is critical to a successful security program, and that commitment isn’t just to the technology and processes. The human component is especially important, whether you want your customers to have confidence in your organization’s ability to protect their data, or whether you need to persuade the C-Suite that the benefits of a solid security plan outweigh the costs. Is there a relationship between security and the patient experience? Do patients and their families notice security issues when they’re in contact with our clinicians and staff? Does it matter? Welcome to Code Red, the HIMSS’ podcast on information security in healthcare. Our guest on this episode is Dan Dodson, President of Fortified Health Security. Dan and I had a chance to sit down at the HIMSS global conference in Las Vegas to discuss how to better manage the way security is perceived by customers and staff. In this conversation, we also discuss the tricky area of demonstrating ROI on security. This Episode’s GuestDan L. Dodson, MBAPresident Fortified Health SecurityConnect with Dan
-
The HIMSS Cybersecurity Call to Action includes an appeal to use a cybersecurity framework across the sector. There are several out there to choose from and, as we state in our call, HIMSS recommends the NIST Cybersecurity Framework. In our latest cybersecurity survey, we asked respondents whether or not they used a framework, and if so, which one they used. While we learned that the majority of respondents that do use a framework use NIST, HITRUST and Critical Security Controls, we also learned that about 17 percent of the respondents use no framework at all. Welcome to Code Red, the HIMSS cybersecurity podcast. In this episode, we wanted to look more deeply into the issue of frameworks how they’re used and implemented; I spoke to Bayardo Alvarez, director of information technology at Boston Pain Care, and Sean Murphy, Vice president and CISO at Premera Blue Cross about their choice and use of frameworks.As you’ll hear, they’ve made different choices, represent very different organizations, and are at different phases of implementation. This Episode’s GuestSean Murphy VP, Chief Information Security Officer Premera Blue CrossConnect with SeanBayardo AlvarezDirector, Information Technology Boston Paincare Center Connect with Bayardo
-
Manglende episoder?
-
In the fight to keep health data safe, every node on your network is a potential battlefield. The fight is easy to notice on the laptops, desktops, smart phones and tablets every time you get a notification a new update or patch has been sent out. But how easy is it to notice in the next theater of combat, the war to secure connected medical devices? Welcome to Code Red, HIMSS’ cybersecurity podcast. On this episode, we speak with someone who is focused on battle between hackers and healthcare systems to secure connected medical devices. We are joined today by George Gray, Chief Technology Officer and VP of Research & Development at smart pump manufacturer, Ivenix. In a conversation recorded at HIMSS18, George and I discuss the paradigm shift cybersecurity is causing in the medical device marketplace, practical tips for healthcare organizations on how they can protect their networked medical devices, and the role healthcare organizations can play as customers in demanding better security from the medical devices they purchase. This Episode’s GuestGeorge GrayChief Technology OfficerVice President of Research & DevelopmentIvenixConnect with George {WHITEPAPER} Ivenix: Addressing Cybersecurity in Infusion DevicesRead the HIMSS Interoperability Showcase Whitepaper Ivenix produced for HIMSS18.
-
If you are trying to figure out if you want to start or advance your career in cybersecurity, this podcast is for you. Perhaps you are trying to figure out how to build a qualified security staff to protect your information.This podcast is for you. Welcome to Code Red, the HIMSS security podcast. In this episode, we speak with Rodney Peterson, Director of National Initiative for Cybersecurity Education at the US Department of Commerce. NICE is all about security education, roles, and security specialties. Whether you are a student learning the field, or an employer trying to write accurate job descriptions, this episode is for you. This Episode’s GuestRodney PetersenDirector of National Initiative for Cybersecurity EducationNational Institute of Standards and TechnologyU.S. Department of CommerceConnect with Rodney
-
Cybersecurity can be a complex topic, and that complexity seems to increase with each new vulnerability or threat identified. How do you keep track of everything you’re supposed to do in order to protect your data, your organization, your patients? Where do you start? There are tools to help keep track and stay organized, and in this episode of Code Red, we’re going to talk about just one of those tools, the NIST Cybersecurity framework. Frameworks provide user guidance to help your organization enhance its ability to, in the language of the NIST Cybersecurity Framework:IdentifyProtectDetectRespond andRecoverafter a cybersecurity incident. In this episode, we speak with Matthew Barrett, Program Manager, Cybersecurity Framework at the National Institute of Standards and Technology, on the ways healthcare organizations can leverage the NIST Cybersecurity Framework to help keep their health data safe. This Episode’s GuestMatthew BarrettProgram Manager, Cybersecurity FrameworkNational Institute of Standards and TechnologyLearn more about Matthew
-
What are the security threats your organization perceives to be most urgent to mitigate? Do you have the capabilities to implement those controls? Sometimes you need to go outside and bring in a third party to help. But what do you look for when searching for a vendor? How do you build a true partnership? Finally, is there still room for innovation in the security realm? That’s a lot of questions, and we’ve got the answers! On this episode of Code Red, you’ll hear from Patrick Streck, Senior Director IT at Baystate Healthcare. Our other guest is Aaron Miri, CIO and VP Government Relations at Imprivata. Patrick and Aaron talk about the way Baystate and Imprivata work together to address security issues. This episode is about the customer/vendor relationship, specific to the security space. While these are just two of many providers and security vendors, Patrick and Aaron were kind enough to share some great tips that worked for these two organizations; perhaps these will help you as well. This Episode’s GuestsPatrick Streck, MBASenior Director, IT Baystate HealthcareLearn more about PatrickFollow Patrick on Twitter: @PatrickStreck Aaron Miri, MBAChief Information Officer Vice President, Government Relations ImprivataLearn more about AaronFollow Aaron on Twitter: @AaronMiri This Episode’s Audience AskHow does your organization partner with its cybersecurity solutions provider? Send us a voice memo from your smart phone with your thoughts. You can send them to [email protected] and we will play them on the air at the end of our next episode.
-
Imagine you work at a hospital and you are responsible for the health and wellbeing of thousands of patients a year. That’s not such a stretch. Many of us listening to this podcast are in this situation. You are in charge of the information systems at the hospital and all the data is your responsibility, whether clinical or operational. And you’re responsible for maintaining the privacy and security of that data. Let’s add a little pressure: imagine your hospital is attacked by hacktivist group with a political agenda—and, it’s a children’s hospital. What would you do?Welcome to Code Red, HIMSS’ cybersecurity focused podcast. In this episode, we hear from Daniel Nigrin, MD, MS, Sr. Vice President and CIO at Boston Children’s Hospital. Dan shares his story of how Boston Children’s handled and survived an attack by the hacktivist group, Anonymous. This Episode’s GuestDaniel Nigrin, MD, MSSr. Vice President/CIO Boston Children’s HospitalLearn more about DanielLearn about Boston Children's HospitalThis Episode’s Audience AskHas your organization been a target of hackers? Are you ready if it is? Send us a voice memo from your smart phone with your thoughts. You can send them to [email protected] and we will play them on the air at the end of our next episode.
-
There’s a shortage of people qualified to work in cybersecurity, and we need to do something about that. But what is that “something?” Let’s be honest here, we’re not going to change that situation overnight. It takes years to acquire the kind of skills needed to pursue the education, experience and credentials required. But what can we do in the meantime? We’ve said it before on Code Red: we’re all involved in security, to one degree or another. What can we do to effectively raise awareness and change behavior?This episode’s guest offers some insights. While at our annual conference in Orlando, Code Red sat down to discuss these and other issues with Servio Medina, CISSP, Chief Operating Officer of the Cybersecurity Policy Branch at the US Defense Health Agency. Servio sees opportunities in changing the way we think about educating each other in this field, and discusses burnout, math, lifestyles and other topics, and how they relate to cyber-education. After listening to this episode, the phrase “It makes sense to me” will take on a whole new dimension. This Episode’s GuestServio Medina, CISSPCheif Operating Officer, Cybersecurity Policy BranchUS Defense Health AgencyLearn more about ServioFollow Servio on Twitter: @serviofmedinaLearn about the US Defense Health AgencyThis Episode’s Audience AskHow does your organization "make sense" of an enterprise-wide approach to cybersecurity? How has your organizational culture around cybersecurity changed over the past few years? Any lessons to share with others? Send us a voice memo from your smart phone with your thoughts. You can send them to [email protected] and we will play them on the air at the end of our next episode.
-
When it comes to cybersecurity, the enemy holds many advantages. They run the timetable. They establish the rules of engagement. And in a culture that exults the bandit, the pirate, and the hacker, they find many fellow travelers in dark places, on the web and in the world. But for every bandit there is a sheriff. This age is no different. Rather than wearing badges and walking dusty wooden sidewalks, today’s cybersecurity sheriffs wear suits and roam the network, looking for vulnerabilities to fix before they are exploited. Rather than protecting the townsfolk with a steady hand and trusty Colt, today’s cybersecurity sheriffs wield effective governance plans and the leadership to convince their organization that lazy passwords and curious clicks are the keys to the loot that bandits are riding off into the sunset with today. Welcome HIMSS’s new health IT cybersecurity podcast, Code Red. Code Red focuses on cybersecurity challenges facing health care today & tomorrow, featuring the voices of the people on the front lines. The goal of the podcast is to explore the interplay between the people, processes & technologies that make up an organization’s cybersecurity posture from both a leadership & skills-based perspective. In today’s episode, we will explore how to successfully design and implement effective cybersecurity governance with 2016 Chicago CISO of the Year, Todd Fitzgerald, Global Director Information Security for Grant Thornton International. Time to hop on your horse and ride… This Episode’s GuestTodd FitzgeraldChief Information Security OfficerGrant Thornton International, Ltd.Learn more about ToddFollow Todd on Twitter: @SecurityFitzLearn more about Grant Thornton International, Ltd. This Episode’s PromosHIMSS17 is the meeting place for all things health IT. Experience over 300 education programs, more than 1,200 vendors, hundreds of special programs, and limitless networking opportunities. Collaborate with HIMSS and thousands of colleagues worldwide as you work to positively transform health and lives through IT.Register Today This Episode’s Audience AskWhat lessons has your orgnazation learned about an effective cybersecurity governance structure? Send us a voice memo from your smart phone with your thoughts. You can send them to [email protected] and we will play them on the air at the end of our next episode.
-
This Episode’s GuestGreg WolvertonChief Information OfficerARcareLearn more about GregFollow Greg on Twitter: @GregWolvertonLearn more about ARcareUniversity of Houston professor Brené Brown understands the strength that comes from embracing our vulnerabilities. “When we spend our lives”, Brown says, “waiting until we’re perfect or bulletproof before we walk into the arena, we ultimately sacrifice relationships and opportunities that may not be recoverable, we squander our precious time, and we turn our backs on our gifts, those unique contributions that only we can make. Perfect and bulletproof are seductive, but they don’t exist in the human experience.”In an age of ubiquitous cybersecurity threats, it takes a strong organization to embrace its vulnerabilities. To understand that true strength comes from the willingness to examine and reexamine our weaknesses. To lead by the need to learn about ourselves. To lead by the need to share with others. Welcome HIMSS’s new health IT cybersecurity podcast, Code Red. Code Red focuses on cybersecurity challenges facing health care today & tomorrow, featuring the voices of the people on the front lines. The goal of the podcast is to explore the interplay between the people, processes & technologies that make up an organization’s cybersecurity posture from both a leadership & skills-based perspective. In today’s episode, we will discuss how ARcare, a Davies award recipient and EMRAM Stage 7 non-profit that provides medical and dental care to residents in rural Arkansas responded to a recent cybersecurity breach with Greg Wolverton, CIO of ARcare and Chair of the HIMSS User Experience committee. This Episode’s PromosHIMSS17 is the meeting place for all things health IT. Experience over 300 education programs, more than 1,200 vendors, hundreds of special programs, and limitless networking opportunities. Collaborate with HIMSS and thousands of colleagues worldwide as you work to positively transform health and lives through IT.Register Today This Episode’s Audience AskIs your organization willing to understand its cybersecurity vulnerabilites in order to better protect your network? Any lessons to share with others? Send us a voice memo from your smart phone with your thoughts. You can send them to [email protected] and we will play them on the air at the end of our next episode.
-
Let’s accept the fact that we want to feel secure in some way, whether it is secure in our jobs, our relationships, or our personal safety and wellbeing. We want the best for our families, our business endeavors or, as in healthcare, for the other people for whom we have some degree of responsibility. But how do you place a value on the effort we make to create a secure environment? In this episode of Code Red, we talk with Fred Cox, Director of Information Security at Varian Medical Systems about the financial implications of cybersecurity, including direct and indirect costs of security, the idea of table stakes and behavior analytics, and at which point the concept of cybersecurity’s ROI can effectively be considered. This Episode’s GuestFredrick Cox, CISSPDirector, Information SecurityVarian Medical SystemsLearn more about FredFollow Varian Medical Systems on Twitter: @VarianMedSysLearn more about Varian Medical Systems This Episode’s PromosHIMSS17 is the meeting place for all things health IT. Experience over 300 education programs, more than 1,200 vendors, hundreds of special programs, and limitless networking opportunities. Collaborate with HIMSS and thousands of colleagues worldwide as you work to positively transform health and lives through IT.Register Today This Episode’s Audience AskWhat does your organization quantify the finanical implications of cybersecurity? Send us a voice memo from your smart phone with your thoughts. You can send them to [email protected] and we will play them on the air at the end of our next episode.
-
It’s amazing what a difference a moment can make. By the time you’re done listening to this introduction, 160 new malware samples will be released. By the time you’re done listening to this introduction, someone will have become the first victim of a spam-based malware attack. By the time you’re done listening to this episode, ten thousand Facebook accounts will be compromised. 27 thousand computers worldwide will be added to a botnet. The US Navy will be cyberattacked 45,000 times. The NSA will be cyberattacked 5.2 Million times. Since 2009, detected cybersecurity incidents have increased 66% year-over-year. By the time you’re done listening to this episode, how many of your records have been attacked? By the time you’re done listening to this episode, who, undetected, has gained access to your network? Who has compromised your system? Do you know? It’s amazing what a different a moment can make. Scared yet? Don’t worry. We won’t be offended. Go ahead and pause the podcast to call your chief security officer. Go ahead. Go. Go now.Welcome HIMSS’s new health IT cybersecurity podcast, Code Red. Code Red focuses on cybersecurity challenges facing health care today & tomorrow, featuring the voices of the people on the front lines. The goal of the podcast is to explore the interplay between the people, processes & technologies that make up an organization’s cybersecurity posture from both a leadership & skills-based perspective. In today’s episode, we will explore the speedy evolution of hacking techniques, their impact on the health care industry, and the role we all have in effective cybersecurity with Kevin Johnson, CEO of Secure Ideas and HIMSS16 Views from the Top speaker. We will also hear about the launch of HIMSS’ new Cybersecurity hub at the HIMSS Innovation Center in Cleveland, Ohio. This Episode’s GuestKevin JohnsonFounder & CEOSecure IdeasLearn more about KevinFollow Kevin on Twitter: @secureideas Learn more about Secure Ideas This Episode’s PromosThe HIMSS Privacy & Security Forum is the nation’s leading event dedicated exclusively to healthcare privacy and security. These premier two-day conferences are held around the country and bring together hundreds of senior executives for thought leadership focused on solving some of the industry’s toughest challenges. The HIMSS Privacy & Security Forum is designed to meet the needs of CIOs, CISOs and other senior health IT leaders. The information shared at the forum is practical, solutions-based and actionable – designed to help with planning, coordination and oversight. Each event offers the opportunity to learn of industry developments, network with peers, and discuss key topical issues. Topics covered include: cloud security; cybersecurity; HIPAA; identity & access management; incident response; medical device security; vendor management; and more. The next HIMSS Privacy & Security Forum is scheduled for December 5th to the 7th at the Westin Boston Waterfront in Boston, Massachusetts. Find more information about the upcoming HIMSS Privacy & Security Forum.This Episode’s Audience AskWhat does your organization do to defend itself from data breaches? Send us a voice memo from your smart phone with your thoughts. You can send them to [email protected] and we will play them on the air at the end of our next episode.
-
On March 12, 2008, the New York Times reported about a team of computer security researchers from Beth Israel Deaconess Medical Center and the Universities of Washington and Massachusetts that able to gain wireless access and reprogram a combination heart defibrillator and pacemaker to deliver potentially fatal jolts of electricity to a person with the device. Since that zero day nine years ago, the health care industry has moved up to top of the list for cybersecurity attacks. Since that zero day nine years ago, millions of pacemakers have been implanted worldwide. Since that zero day nine years ago, the mobile device market has been forecasted to have 8-Billion-dollar market value by 2019. So as we begin Cybersecurity Awareness Month, what should healthcare organizations do to protect patients and their connected medical devices from being compromised? In this episode of Code Red, we discuss the impact that connected health will have on medical device security with HIMSS Privacy & Security Committee member Cathy Petrozinno, Principal, Cybersecurity Partnerships and Information Privacy at MITRE Corporation. This Episode’s GuestCatherine M. Petrozzino, CIPP/G/US/ITPrincipal, Cybersecurity Partnerships and Information PrivacyMITRE CorporationLearn more about CathyFollow the MITRE Corporation on Twitter: @MITREcorpLearn more about the MITRE Corporation This Episode’s PromosThe HIMSS Privacy & Security Forum is the nation’s leading event dedicated exclusively to healthcare privacy and security. These premier two-day conferences are held around the country and bring together hundreds of senior executives for thought leadership focused on solving some of the industry’s toughest challenges. The HIMSS Privacy & Security Forum is designed to meet the needs of CIOs, CISOs and other senior health IT leaders. The information shared at the forum is practical, solutions-based and actionable – designed to help with planning, coordination and oversight. Each event offers the opportunity to learn of industry developments, network with peers, and discuss key topical issues. Topics covered include: cloud security; cybersecurity; HIPAA; identity & access management; incident response; medical device security; vendor management; and more. The next HIMSS Privacy & Security Forum is scheduled for December 5th to the 7th at the Westin Boston Waterfront in Boston, Massachusetts. Find more information about the upcoming HIMSS Privacy & Security Forum.This Episode’s Audience AskWhat is your medical device security threat posture? Send us a voice memo from your smart phone with your thoughts. You can send them to [email protected] and we will play them on the air at the end of our next episode.
-
Need to know the dosage for a patient’s medication? Tough, pay me. Need to know the lab results for that biopsy? Tough, pay me. Need to access your notes to reconsider a patient’s prognosis? Tough, pay me.Well, this is a new problem, isn’t it? Paper records on a shelf? Pretty hard to walk off with those. You can keep an eye on those. You can lock a door on those. Electronic records on your database? Take a number. Who isn’t after them? Who isn’t going to earn more money on the street today, on this very day, from those records than you are? Because we all know negotiating a new world of evolving health care revenue models is challenging. Because we all know that their revenue model is one of the world’s oldest and easiest to understand. You want it, I got it. You want it, I got it. Now let’s see how bad you want it back.So how does a newly digitized health care industry react to all this attention from a long-ago digitized criminal industry? How can health care organizations operate in a marketplace that asks them to share data both widely and securely? How does a health care organization ready itself to handle unwanted ransomware attacks? How do health care organizations build trust between their people, partners & patients that they are ready when the attack happens to them? Because.It.Will.Happen.In this episode of Code Red, we explore the evolving threat of ransomware attacks on the health care industry and what organizations can do to protect themselves with the Chair of the HIMSS Privacy & Security Committee, Josh Black.This Episode’s GuestJosh BlackManager, IT Security AdministrationInformation Risk OfficerAssistant HIPAA Security OfficerUniversity of Arkansas for Medical SciencesLearn more about JoshFollow CUniversity of Arkansas for Medical Sciences on Twitter: @uamshealthLearn more about University of Arkansas for Medical Sciences This Episode’s PromosHealthcare Privacy & Security Forum The Privacy & Security Forums are two-day conferences, presented by HIMSS Media, held around the nation, with a specific focus on current industry topics. Register for the December 2016 Healthcare Privacy & Security Forum in Boston, Massachusetts This Episode’s Event RecapHost Rod Piechowski describes the cybersecurity challenges being discussed at the 2016 HIMSS AsiaPac Conference. Learn more about the HIMSS Asia Pac ConferenceRead Rod's blog post on the conference "We're All In This Together"This Episode’s Audience AskSend us voice memos or emails describing your organization’s top ransomware challenges and what you are doing to meet those challenges. Also let us know what topics you’d like us to cover on future Code Red episodes. Send your voice memos and emails to [email protected].
-
Welcome to Code Red, HIMSS’s new health IT cybersecurity podcast. Code Red focuses on cybersecurity challenges facing health care today & tomorrow, featuring the voices of the people on the front lines. The goal of the podcast is to explore the interplay between the people, processes & technologies that make up an organization’s cybersecurity posture from both a leadership & skills-based perspective. In this August update episode, we will explore the right skills needed for Chief Information Security Officers from two thought leaders in health care security. We will hear about privacy & security initiatives you can participate in here at HIMSS.This Episode’s GuestsMac McMillan, FHIMSS, CISMCEOCynergisTek, Inc.Learn more about MacFollow CynergisTek, Inc on Twitter: @cynergistekLearn more about CynergisTek, Inc. Heather Roszkowski, MSIA, CISSPChief Information Security OfficerThe University of Vermont Medical CenterLearn more about HeatherFollow The University of Vermont Medical Center on Twitter: @UVMMedCenterLearn more about The University of Vermont Medical Center Find Mac & Heather's HIMSS15 Presentation "Selecting the Right CISO & Building the Security Office" in the HIMSS eLearning Center This Episode’s PromosHIMSS17The 2017 HIMSS Annual Conference & Exhibition, February 19–23, 2017 in Orlando, brings together 40,000+ health IT professionals, clinicians, executives and vendors from around the world. Exceptional education, world-class speakers, cutting-edge health IT products and powerful networking are hallmarks of this industry-leading conference. Register today for HIMSS17Healthcare Privacy & Security Forum The Privacy & Security Forums are two-day conferences, presented by HIMSS Media, held around the nation, with a specific focus on current industry topics. Register today for the December 2016 Healthcare Privacy & Security Forum in Boston, MassachusettsThis Episode’s Audience AskSend us voice memos or emails describing your organization’s top cybersecurity challenge and what you are doing to meet that challenge. Also let us know what topics you’d like us to cover on future Code Red episodes. Send your voice memos and emails to [email protected]
-
So here’s what keeps me up at night: The neighbor’s barking dog. The stray firecracker that goes off at 2:30. And Patients. Millions of patients. And when I say patients, I really mean people. Millions of people whose most intimate details… their stories…have been laid bare for the world to see on behalf of the highest bidder. Millions of people who have to wonder who knows about their recent bout of depression. Or who knows about their history of high blood pressure and their medication for it? What about that cancer scare? And if that isn’t enough, that these people have to wonder, whose got my social security number? How many accounts have been opened in my name? How many purchases made with my credit? Collectively, we have to wonder if we can ever be truly secure? Are our physical and virtual lives irreversibly intertwined? Is the idea of privacy even a valid concept anymore? These questions, for which there are no easy answers, are some of the things that keep me up at night. I bet they keep you up too. So here’s what keeps me going each day. For every malicious hacker, there is a white-hatted one. For every attack on a server, there is a dedicated IT security professional ready to respond. For every malicious line of code, there is one created to defend against the malice.So how do we respond? How does the health care sector deal with the cybersecurity issue? Who do we look to for leadership and guidance through the battles ahead of us? Welcome to HIMSS’s new health IT cybersecurity podcast, Code Red. Code Red focuses on cybersecurity challenges facing health care today & tomorrow, featuring the voices of the people on the front lines. The goal of the podcast is to explore the interplay between the people, processes & technologies that make up an organization’s cybersecurity posture from both a leadership & skills-based perspective.In this episode we will discuss the existential threat of cybersecurity attacks in the age of ubiquitous digital health and the range of current cyber-security threats. We’ll talk to HIMSS Privacy & Security Committee member, Ram Ramadoss, Vice President – Privacy, Information Security & EHR Oversight at Catholic Health Initiatives, the nation’s third-largest nonprofit health system. -Rod Piechowski (Host) This Episode’s Guest: Ram RamadossVice President, Privacy, Information Security & EHR OversightCatholic Health InitiativesMember-Cybersecurity Task Force, Department of Health & Human ServicesLearn more about Ram: https://www.linkedin.com/in/ramramadossFollow Catholic Health Initiatives on Twitter: @CHI_UpdatesMore on Catholic Health Initiatives: http://www.catholichealthinitiatives.org/ This Episode's TranscriptRead it here This Episode’s News: 2016 HIMSS Cybersecurity Survey ResultsDownload a copy of the 2016 HIMSS Cybersecurity Survey results. Cybercriminal TheDarkOverlord stole more patient records and medical images than originally thought, InfoArmor reportsThe hacker broke into organizations on the HL7 network, the security firm has found, and has since put those records up for sale on the dark web. The security firm also said TheDarkOverlord is actively looking for more servers to hack in healthcare. Read moreInformatics experts offer guidance for defense against ransomwareAs ransomware attacks continue to increase, healthcare stakeholders across the board are going to have to step up their efforts both to prevent and recover from security incidents as quickly as possible. In an attempt to move those efforts forward, Dean Sittig, a professor at the University of Texas School of Biomedical Informatics, and Hardeep Singh, MD, chief of the Health Policy, Quality and Informatics Program for the Department of Veterans Affairs, recently wrote "A Socio-technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.” Read moreRead the whitepaper “A Socio-technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks”This Episode’s Hashtags: #HITSecurity, #HITworks, #Ransomware, #YouAreTheNextTargetThis Episode’s Promo:Healthcare Privacy & Security Forum The Privacy & Security Forums are two-day conferences, presented by HIMSS Media, held around the nation, with a specific focus on current industry topics. Register for the December 2016 Healthcare Privacy & Security Forum in Boston, Massachusetts This Episode’s Audience Ask:Send us voice memos or emails describing your organization’s top cybersecurity challenge and what you are doing to meet that challenge. Also let us know what topics you’d like us to cover on future Code Red episodes. Send your voice memos and emails to [email protected]