As cyberthreats to medical research on COVID-19 – and other intellectual property – grow, organizations must take critical steps to prevent the theft of their “innovation capital,” says Russell Koste, Chief Security Officer at Alexion Pharmaceuticals, and one of the HSCC CWG Leaders on the Health Industry Cybersecurity Protection of Innovation Capital (HIC-PIC)
The HIC-PIC was released on May 14, 20209 and available on our website.
The latest Healthcare and Public Health Sector Coordinating Council (HSCC) insights detail ways healthcare entities can better secure its trade secrets and medical research from cyber theft.
The Health Industry Cybersecurity Protection of Innovation Capital (HIC-PIC) was released on May 14, 20209 and available on our website.
Protecting Your Patients and Yourself from Cyber Threats while Teleworking
The healthcare workforce is always evolving and becoming more and more flexible. This flexibility includes the workforce becoming more remote, which in turn means there are more cyber threats to consider. Check out the poster below that details 12 tips you can implement from your organization and from your home to help fight cyberattacks while teleworking!Teleworking_Tips
This resource was designed to be printed as an 11×17 poster or can be sent out through email. For more resources such as this, please check out our social media accounts on Instagram, Twitter and Facebook with the @ask405d social handle or email email@example.com .
Responding to a spike in cyber threats that exploit telework technologies during the COVID-19 pandemic, the American Medical Association (AMA) and the American Hospital Association (AHA) have teamed to provide physicians and hospitals with guidance on protecting a remote work environment from cyber criminals.
The two leading associations have created a joint cybersecurity resource, Working from home during the COVID-19 pandemic, offering actions to strengthen home or hospital -based computers, networks, and medical devices from the rise in COVID-19-themed security threats and attacks. The resource includes checklists, sources, tips and advice on strengthening protections to keep pace with deceptive cyberattacks that could disrupt patient care or threaten medical records and other data.