Browsing the "health tech" Tag

The spread of medical misinformation should be treated like a cyberattack

June 19th, 2019 | 🕒

iSpeech.org Jackie Drees - Tuesday, June 18th, 2019<a href="http://www.beckershospitalreview.com/cybersecurity/viewpoint-the-spread-of-medical-misinformation-should-be-treated-like-a-cyberattack.html?tmpl=component&print=1&layout=default" data-tracking="print" title="Print article " onclick="window.open(this.href,'win2','status=no,toolbar=no,scrollbars=yes,titlebar=no,menubar=no,resizable=yes,width=640,height=480,directories=no,location=no'); return false;" rel="nofollow"> Print  | Email The


4 Qs with UC Davis cybersecurity expert Dr. Jeff Tully

June 4th, 2019 | 🕒

https://www.ispeech.org/text.to.speech Jackie Drees - Monday, June 3rd, 2019<a href="http://www.beckershospitalreview.com/cybersecurity/threats-vulnerabilities-of-medical-device-cyberattacks-4-qs-with-uc-davis-cybersecurity-expert-dr-jeff-tully.html?tmpl=component&print=1&layout=default" data-tracking="print" title="Print article " onclick="window.open(this.href,'win2','status=no,toolbar=no,scrollbars=yes,titlebar=no,menubar=no,resizable=yes,width=640,height=480,directories=no,location=no'); return false;" rel="nofollow"> Print  | Email Jeff


Hackers may turn patient PHI into malware in medical image files

April 16th, 2019 | 🕒

iSpeech Jackie Drees - Tuesday, April 16th, 2019<a href="http://www.beckershospitalreview.com/cybersecurity/hackers-may-turn-patient-phi-into-malware-in-medical-image-files.html?tmpl=component&print=1&layout=default" data-tracking="print" title="Print article " onclick="window.open(this.href,'win2','status=no,toolbar=no,scrollbars=yes,titlebar=no,menubar=no,resizable=yes,width=640,height=480,directories=no,location=no'); return false;" rel="nofollow"> Print  | Email Hackers