Android Apps are crucial to Telehealth cybersecurity. But which work best? Irdeto’s CMO Steeve Huin has answers!
Android Apps are crucial to Telehealth cybersecurity. But which work best? Irdeto’s CMO Steeve Huin has answers!
The SolarWinds hack was an innovative attack, and a horrific violation. Fortunately, we can learn some great lessons from it to protect ourselves from future attacks.
The state of cybersecurity for telemedicine mobile apps is in an alarming state. Check out Irdeto’s latest findings in this Whitepaper report.
“Cybersecurity Awareness Month” should be spent learning about cybersecurity, sharing and fighting off hackers!
Ransomware is wreaking havoc on hospitals, turning human errors into tragedies. See what you can do to stay safe.
Sharks are dangerous and distracting. While you were looking at them, cybercriminals just stole millions from a casino. You never know how people can get access to your network.
There are stringent criteria medical devices must meet to be classed as trustworthy, alongside the software within them – but what does that consist of? Learn more about the importance of trustworthy medical devices in part one of our Trustworthy Devices blog series.
Throughout our Telehealth and Telemedicine blog series, we looked at the differences between connected health technologies, types of connected medical devices, the basics of data security and privacy, key HIPAA compliance regulations, why app developers and vendors should implement strong cybersecurity measures to meet these regulations and the possible repercussions that could occur if they aren’t implemented. In this blog, we review what this all means.
Anyone that deals with Personally Identifiable Information and Protected Health Information must comply with the Health Insurance Portability and Accountability Act (HIPAA), including telemedicine providers and platforms. In this blog we investigate further into the HIPAA rules and why it’s so important to comply.
With the significant increase in demand in telemedicine and the rise of cyberthreats, it is essential for telehealth vendors to understand that Protected Health Information are the most lucrative targets for hackers, and they need to be protected. Good-enough protection is no longer enough. In this blog we propose a few tips on how to protect your telemedicine apps.