Privacy & Security

By Mike Restuccia 11:48 am January 31, 2020
It's hard for me to believe, but I’ve been at Penn Medicine for 13 years. There has been a remarkable amount of change, growth, and learning that has occurred both within my organization and in myself during this time.
By Saif Abed 09:15 am January 29, 2020
Dr Saif Abed, director of cybersecurity advisory services at AbedGraham, says it's high time suppliers invested in people and processes.
By Rod Piechowski 10:09 am August 28, 2019
Leaders know that the IT department alone cannot secure an organisation, and that the easiest path to breach the best technical defenses is through their people, writes Rod Piechowski, VP of thought advisory for HIMSS.
Ransomware and medical devices: How behavior analytics can protect patients
By William Scandrett 04:51 pm August 16, 2019
Medical devices must be managed from a security perspective, but also from an operational perspective. Using analytics to establish behavior baselines helps support risk assessments, find malfunctions and enhance staff productivity.
By Dan Costantino 04:08 pm June 25, 2019
Putting an infosec program into place is a balancing act, requiring a very careful approach and significant involvement from a wide array of stakeholders, says Penn Medicine CISO Dan Costantino.
By Saif Abed 09:46 am April 29, 2019
Dr Saif Abed, founding partner of health IT consultancy firm AbedGraham, looks at how interoperability could "break healthcare".
By Saif Abed 09:02 am January 22, 2019
Dr Saif Abed, founding partner of health IT consultancy AbedGraham, looks at the new 10-year plan for the National Health Service in England.
US Senate capital building exterior view of dome
By Tom Leary 08:41 am October 08, 2018
Tom Leary highlights milestones made during the annual event and looks at this year’s NHITWeek points of engagement.
hospital infusion pumps and cybersecurity
By Dan Costantino 09:41 am May 16, 2018
Penn Medicine’s Dan Costantino recommends hospitals to get ahead of the issue, understand scope, and implement layers of cybersecurity to start.
code of cyberattack of server firewall
By Lee Kim 09:36 am May 07, 2018
Even with fortified defenses, attackers only need an opening while the defender must be constantly on-guard; just one mistake opens the point of entry.