Medical industry struggles with PACS data leaks

PACS servers are often used to store and transmit patient data. But how is their security implemented? We take a look at case of how poor setup can easily lead to data leaks.

Read more

Please stop posting your X-rays to social media

Many people post unredacted medical images to Twitter and Instagram. They shouldn’t because the details included on the image often can compromise personal identity online and in rare instances, lead to a possible attack on an exposed piece of medical IT infrastructure.

Read more

Think tank summarizes what happens to healthcare records after breach

The ICIT, an American cybersecurity research institute, has made a case about the importance of healthcare security in an age where the threat landscape is rapidly changing; however, medical institutions continually fail or are slow to adapt. As a result, patients end up at the losing end.

Read more

Select your language