Hospital Administrators Face Cyber Data Threats

Portrait of Medical Practitioners
Hospital Administrators Focus on Cyber Security Improvements for Data and Staff

As the potential pitfalls of cyber security have evolved over the years, hospital administrators have more to worry about than ever. In addition to the protection of highly sensitive medical data, hospitals also face a constant threat of data ransom and even weaponized WiFi-enabled devices.

What your hospital does now to add protections and educate employees could make the difference when a cyber attack does eventually happen.

HealthcareDive runs down the top four data threats in hospitals:

Negligence ranging from unencrypted data to employees using shared passwords

Internal threats including intentional harm and accidental loss of personal devices

Internet of Things vulnerabilities, with Internet-enabled medical devices becoming a target for hackers and DDoS attacks

Ransomware attacks wherein hackers seize control of a network and demand payment

What Can Hospitals Do to Improve Cyber Security?

IT experts and healthcare experts must look to technology to play a strong defense, while also teaching good practices to employees at all levels.

• Always use data encryption

• Establish an employee protocol for bring-your-own devices

• Practice good password hygiene with frequent changes

• Self-audit to prevent internal fraud and inappropriate access

• Vet medical devices and equipment for hacking protection

Handling Hospital Materials the Right Way

Everything hospital staff do can impact your bottom line. A hospital equipment cart mover lets nurses and janitors stay productive and efficient, with less strain and injury risk. Run a tight ship when it comes to daily tasks like material movement, and management can spend more time overseeing the strategic decisions instead.

Follow our blog for healthcare news, and read about the hospital equipment cart mover for boosting efficiency and reducing injury claims.

Defense Contractors Get Extension on Cyber Security Standards

network security
Cyber Security

An eleventh-hour reprieve has given Department of Defense contractors a reprieve until the end of 2017 before complying with new cyber security standards. For many firms, this defense contracting news comes as a welcome assurance that ample time will be allowed to implement new protocols.

Deadline extended: DOD contractors still face stricter security rules

The DOD heard concerns in December that the January 1, 2015 deadline would be causing undue difficulties for contractors and subcontractors. The reprieve finds a middle ground for increasing protection for sensitive, non-classified data.

Before the latest cybersecurity standards become mandatory, contractors will be required to report non-compliant elements that may affect a contract. The amended rules also stipulate that the toughest security standards will apply only to those subcontractors who are handling certain important data or whose contracts affect critical operations.

More information about the DOD cyber security rules is available from the National Institute of Standards and Technology.

The 2015 NDAA called for tougher security practices for the military and its contractors due to a growing frequency of threats and incidents involving sensitive military data. The goal is to reduce cyber attacks and also mandate reporting of potential breaches.

At DJ Products, we watch out for important defense contracting news that affects our clients. As a DOD contractor you know that staying on top of regulations is critical to maintaining DOD relationships.

As a manufacturer of GSA-approved equipment moving and material handling equipment for military applications, we report on major defense contracting news to help keep you informed. Follow our blog for regular updates on DOD news and solutions for defense contractors.

Healthcare Industry Needs More Cybersecurity Professional

Female Scientists or Doctors Using Microscopes in a Laboratory
Under The Microscope

The healthcare industry finds itself under the microscope for serious cybersecurity risks. Health consumer data has been the top target of data breaches for years, and in 2015 approximately one-third of all data theft occurred in healthcare.

Top talent in cybersecurity gravitates toward tech and finance industries, leaving healthcare employers lacking in human resources. Tech Republic explains the cybersecurity worker shortage:

  • 4 out of 5 cybersecurity jobs require both a bachelor’s degree and three years of experience.
  • In addition to IT skill sets, cybersecurity requires accounting and finance knowledge.
  • HIPAA and other regulations make the job description even more unique.
  • Cybersecurity demand has outpaced the talent supply in recent years, with jobs more than doubling since 2010.

Leveraging Technology for Your Healthcare Business

The health sector has vastly benefited from tech including telemedicine and electronic records. Making use of emerging tech requires a shift in personnel and expenses, however. Especially considering the enormous risks associated with being liable for a consumer data breach.

Most healthcare businesses need to shift additional resources toward IT and cybersecurity. One source of cost cutting: reducing operations expenses.

Powered hospital carts are a great example of a reasonable investment that boosts efficiency and potentially reduces labor costs. Nurses and janitors can use powered hospital carts to perform daily tasks more quickly.

Automated linen carts and medical equipment movers also reduce the risk of workers compensation claims and time lost due to injury, thanks to a reduction in repetitive stressful tasks.

Contact DJ Products to learn more about powered hospital carts that improve performance and your bottom line — so you can make wise investments elsewhere.