Security

Photo

News • Cybersecurity protocol

Protecting wireless medical implants from being hacked

Cyberhealth threats such as the hacking of a medical implant are of real concern as technology moves toward smart, wirelessly connected implants. A new security protocol aims to protect these devices.

Photo

News • Continuous glucose monitoring in traffic situations

Safe behind the wheel: Study shows impact of CGM in diabetic drivers

Periods of hypoglycemia in diabetes patients can cause impaired judgment and lead to traffic accidents. A new study shows that continuous glucose monitoring (CGM) devices can help mitigate this risk.

Photo

News • Prevention, detection, response

EU action plan to increase healthcare cybersecurity

Better protection against cybercrime, more efficient threat deterrence: The European Commission has presented an EU action plan to bolster the cybersecurity of hospitals and healthcare providers.

Photo

Sponsored • Patient positioning

Relief for radiographers: The Get Up holding system for back-friendly repositioning

Discover in only one minute, how the Get Up holding system sustainably assists both patients and medical staff.

Photo

News • Security and surveillance software

AI risk detection for healthcare security and patient safety

Detection of patient falls, unauthorized intrusions on hospital premises, and more: A new suite of AI tools is designed to enhance healthcare security and patient safety surveillance.

Photo

News • Concerns about hurried adoption

Survey: Is medical AI taking over too quickly?

The pace of artificial intelligence (AI) adoption in personalised medicine is unsettling for great parts of the public. A new survey reflects the worried state of mind in the UK.

Photo

Article • QC at AACC 2023

New risk-based quality control assessment for clinical labs

Juggling the cost of quality control (QC) resources versus the risk of testing error is a balancing act no clinical laboratory manager enjoys. It is an inexact process, itself prone to error, which can impact the operations of hospital labs and independent clinical testing companies. In the current resource-constrained healthcare environment, there is pressure to improve the cost effectiveness of…

Photo

Sponsored • Safe blood collection products and value-based care

Protecting patients and healthcare workers

In the last decade, regional and global health organizations have pushed for making safety a central pillar of procurement, with a directive that cost should not be a barrier. The crucial question is: How easy is that to implement? How can a confident decision be reached that protects patients and healthcare workers without straining costs?

Photo

Article • Project EU-JUST-CT

CT scans: systematic evaluation of benefits and risks

When is a CT scan justified, i.e. when do the benefits of a CT scan for the patient outweigh possible risks associated with radiation? Justification has been a major issue among radiologists ever since CT has become widely available and widely used. With regard to dose the answer is the well-known ALARA principle: “As low as reasonable achievable“. Now, the European coordinated action on…

Photo

Sponsored • Boehringer Ingelheim relies on Rein Medical for monitors and digital door signs

Safety guaranteed, requirements fulfilled

Pharmaceutical research companies impose very high security standards on themselves for good reasons, as they are potential victims of cyberattacks and espionage attempts. This is no different at Boehringer Ingelheim. Its systems must be particularly secure, which means they need to meet high standards. The company checks this regularly. One way to ensure this is to separate the systems from the…

Photo

Article • Appeal to healthcare providers and medical device vendors

ECRI reports top 10 health technology hazards for 2023

ECRI’s annual top ten technology hazard list alerts hospitals and healthcare providers of situations, products, and procedures they need to diligently monitor and/or take steps to improve. This non-profit technology Pennsylvania research firm has worked for over 50 years to make healthcare safer. The list reflects the organization’s collective judgment about the health technology risks that…

Photo

Article • Data protection

A shared EU data space for health?

The General Data Protection Regulation (GDPR), which came into force in 2018, has reinforced the European Union’s (EU) reputation of being comparatively strict regarding the protection of personal data within its member states. While the GDPR is generally considered a success, setting standards even outside its jurisdiction, critical voices are becoming louder.

Photo

Article • IT security

Cyberattacks on critical infrastructures on the rise

Some ten years ago, it was unthinkable that virtually all company data was stored in the cloud. Now it’s what almost every company does. However, the increasing complexity of corporate IT infrastructures also comes at a price. The sheer size and complexity of the systems makes it difficult to keep track of everything that is going on digitally. And this leads to more and more successful…

Photo

Article • IT security

Cyber attack: Be prepared!

Ransomware attacks are a highly profitable and flourishing business in the 21st century. They can have a drastic impact on hospitals, clinical laboratories, and patients. The Sophos Group, a British security hard/software company, has reported survey responses from 328 healthcare IT managers in 30 countries.

Photo

Article • Cyberattacks and countermeasures

Healthcare cybersecurity in the EU and US: a technical, regulatory or political issue?

The pandemic has put a spotlight on the increasing role of cyberattacks and weaknesses in healthcare. In healthcare as in other industries, cybercrime does not stop at national borders. With this idea in mind, the US consulate general in Düsseldorf and the US embassy in Vienna recently invited interested parties to their Cybersecurity in Healthcare Briefing.

Photo

Article • IT security

IAM: Even biometrics can be hacked

Of all the methods used in identity and access management (IAM), biometrics is arguably the oldest: it has been around long before IAM was a “thing”. Humans are naturally optimized for recognizing fellow humans’ faces, voices and other biometric features. However, even biometric recognition between humans is less than perfect, as countless cases of successful impersonators and impostors…

427 show more articles
Subscribe to Newsletter