September 21, 2017
By Edward Roche, PhD, JD Hospital Cyberattacks: Part XII: A Personal Encounter
EDITOR'S NOTE: Edward Roche, in association with RACmonitor, is writing a series of articles on the need for U.S. healthcare facilities to protect themselves from cybercriminals demanding ransoms for patient records. This is the twelfth installment in the series. It all started innocently enough. Dr. Wang said my EKG looked “a…
August 24, 2017
By Edward Roche, PhD, JD Hospital Cyber Attacks and Crypto Currency: Part XI
EDITOR'S NOTE: Edward Roche, in association with RACmonitor, is writing a series of articles on the need for U.S. healthcare facilities to protect themselves from cybercriminals demanding ransoms for patient records. This is the eleventh installment in the series. Virtually all major healthcare organizations in the United States have reported…
July 27, 2017
By Edward Roche, PhD, JD Cyber Security of Medicare: Tabletop Simulations: Part 8
EDITOR'S NOTE: Edward Roche, in association with RACmonitor, is writing a series on the need for U.S. healthcare facilities to protect themselves from cybercriminals demanding ransoms for patient records. This is the eighth installment in the series. Hospitals can mitigate the damage from a cyberattack by engaging in simulations designed…
July 19, 2017
By Edward Roche, PhD, JD Prosecution of Medicare Cyber Fraud: Part VII of Series
EDITOR'S NOTE: Edward Roche, in association with RACmonitor, is writing a series on the need for U.S. healthcare facilities to protect themselves from cybercriminals demanding ransoms for patient records. This is the seventh installment in the series. Cybercrime is on everyone’s minds these days, even when there is a Medicare…
July 12, 2017
By Edward Roche, PhD, JD OIG Can Examine Cybersecurity and Internal Controls in Medicare Financial Management: Part VI
EDITOR'S NOTE: Edward Roche, in association with RACmonitor, is writing a series on the need for U.S. healthcare facilities to protect themselves from cybercriminals demanding ransoms for patient records. This is the sixth installment in this series. Cybersecurity audits now are becoming an integral part of the internal control requirements…
June 28, 2017
By Edward Roche, PhD, JD Cyber Risk in Medical Devices: Part V
EDITOR'S NOTE: Edward Roche, in association with RACmonitor, is writing a series on the need for U.S. healthcare facilities to protect themselves from cybercriminals demanding ransoms for patient records. This is the fifth installment in that series and comes on the heels of a reported cyberattack Tuesday at Heritage Valley…
June 21, 2017
By Edward Roche, PhD, JD Here Come the Cyber RACs: DHS Cybersecurity Task Force Releases Report — Says Current Guidelines Inadequate
Last week, the U.S. House of Representatives Committee on Energy and Commerce held a hearing on cybersecurity in healthcare. The U.S. Department of Homeland Security (DHS) Cybersecurity Task Force also just released a report suggesting that current guidelines are not adequate to meet the current situation. The hearing was prompted…
June 14, 2017
By Edward Roche, PhD, JD The Ransomware Crisis, Part III: Best Practices
EDITOR'S NOTE: Edward Roche, in association with RACmonitor, is writing a series on the need for healthcare facilities in the U.S. to protect themselves from cybercriminals demanding ransom for patient records. This is the third installment in a series of reports on the ransomware crisis facing America’s hospitals. The world…
By Edward Roche, PhD, JD
EDITOR'S NOTE: Edward Roche, in association with RACmonitor, is writing a series on the need for healthcare facilities in the U.S. to protect themselves from cybercriminals demanding ransom for patient records. This is the second piece in a series of reports on the ransomware crisis. Hospitals are under attack, as…