New HHS Resource Helps SNFs Increase Cybersecurity

Get equipped to battle the threat of cyber breaches with a new resource from the U.S. Department of Health & Human Resources (HHS) that showcases the five biggest threats and the 10 best practices for aging services providers. 

Aging services and the healthcare industry are among the most frequently pursued for cyber-attacks because data stored is often lucrative, and security is typically weak compared to other fields.

Health Industry Cybersecurity Practices (HICP): Managing Threats and Protecting Patients is a four-volume publication that provides voluntary cybersecurity practices to healthcare organizations of all types and sizes, from local clinics to large hospital systems.

  • Discover the five most relevant and current threats to the industry.
  • Learn 10 cybersecurity practices to help mitigate these threats, from email protection systems to checks on the cyber safety of medical devices.
  • Read about real-life events and statistics that demonstrate the impact that cyber incidents have on financials and patient care.
  • Understand the call to action for all industry stakeholders, from C-suite executives and healthcare practitioners to IT security professionals, to take protective and preventive measures now.  

The publication also includes two technical volumes for IT and IT security professionals, one focused on smalll helathcare organizations and the other for medium and larage healthcare organizations. 

Finally, the publication provides resources and templates to help organizations assess their own cybersecurity posture and develop policies and procedures.  

For more information on cybersecurity, check out the LeadingAge CAST Cybersecurity Resources

Back to news home »

Next Federal Government Shutdown Growing Threat for Care Centers

Previous CMS Announces New Innovations in Medicare Advantage


No one has commented on this article yet. Please post a comment below.

Add a comment

Members must sign in to comment

You must be a member to comment on this article. If you are already a member, please log in. Not a member? Learn how to join »

Log In