<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Jessica Davis &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/jessica-davis/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sat, 26 Sep 2020 17:07:45 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Jessica Davis &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Top Healthcare Cybersecurity Resources from NIST, HHS, OCR, HSCC</title>
		<link>https://risk-academy.ru/top-healthcare-cybersecurity-resources-from-nist-hhs-ocr-hscc/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 26 Sep 2020 17:07:44 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[HSCC]]></category>
		<category><![CDATA[Ministry of Health and Family Welfare]]></category>
		<category><![CDATA[Health Medical Pharma]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[Jessica Davis]]></category>
		<category><![CDATA[OCR]]></category>
		<category><![CDATA[healthcare entities]]></category>
		<category><![CDATA[healthcare providers struggle]]></category>
		<category><![CDATA[Top Healthcare Cybersecurity Resources]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/top-healthcare-cybersecurity-resources-from-nist-hhs-ocr-hscc/</guid>

					<description><![CDATA[By Jessica Davis September 25, 2020 &#8211; Many healthcare providers struggle with finding and retaining security staff, as well as budget constraints, which make it difficult to properly secure the enterprise. In response, a host of [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="articles-content">
<div class="article-top-author">
<p><img decoding="async" title="Health Medical Pharma" alt="Health Medical Pharma" src="https://healthitsecurity.com/images/avatars/avatar_164886.jpg" class="article-top-image"/> By Jessica Davis</p>
</p></div>
<p><time datetime="2020-9-25">September 25, 2020</time> &#8211; M<span data-contrast="auto" xml:lang="EN-US">any healthcare providers</span><span data-contrast="auto" xml:lang="EN-US"> struggle with</span><span data-contrast="auto" xml:lang="EN-US"> finding and retaining security staff</span><span data-contrast="auto" xml:lang="EN-US">, as well as </span><span data-contrast="auto" xml:lang="EN-US">budget constraints</span><span data-contrast="auto" xml:lang="EN-US">, which make it difficult to properly</span><span data-contrast="auto" xml:lang="EN-US"> secur</span><span data-contrast="auto" xml:lang="EN-US">e</span><span data-contrast="auto" xml:lang="EN-US"> the enterprise</span><span data-contrast="auto" xml:lang="EN-US">. In response, a host of industry stakeholders have provided free cybersecurity resources to support those organizations</span><span data-contrast="auto" xml:lang="EN-US"> in shoring up vulnerabilities and keeping pace with the ever-evolving threat landscape.</span> </p>
<p>So far in 2020, some of the biggest data <span data-contrast="none" xml:lang="EN-US"><span data-ccp-charstyle="Hyperlink">breaches</span></span><span data-contrast="auto" xml:lang="EN-US"> were caused by ransomware, business associates, phishing, and hacking incidents. All have spotlighted the industry’s biggest vulnerabilities</span><span data-contrast="auto" xml:lang="EN-US">, while continuing to serve as a reminder of the need to find these gaps and strengthen the overall cyber posture across the </span><span data-contrast="auto" xml:lang="EN-US">sector.</span> </p>
<p>A<span data-contrast="auto" xml:lang="EN-US">n abundance of </span><span data-contrast="auto" xml:lang="EN-US">resources </span>provide healthcare entities with nearly step-by-step guidance on the biggest threats, including ransomware, telework, supply chain, and other <span data-contrast="auto" xml:lang="EN-US">significant</span> <span data-contrast="auto" xml:lang="EN-US">risks. As industry stakeholders have continued to stress, providers can no longer take a reactive approach to cybersecurity.</span> </p>
<h3><strong>NIST </strong></h3>
<p>CynergisTek <span data-contrast="none" xml:lang="EN-US"><span data-ccp-charstyle="Hyperlink">reported</span></span><span data-contrast="auto" xml:lang="EN-US"> that just&#8230;</span></p>
</div>
<p><a href="https://healthitsecurity.com/news/top-healthcare-cybersecurity-resources-from-nist-hhs-ocr-hscc">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Key Needs for a Resilient Healthcare Information Security Program</title>
		<link>https://risk-academy.ru/key-needs-for-a-resilient-healthcare-information-security-program/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 26 Aug 2020 18:19:26 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[secure healthcare system]]></category>
		<category><![CDATA[Principal Advisor and Solution Leader of Information Security]]></category>
		<category><![CDATA[healthcare sector]]></category>
		<category><![CDATA[Jessica Davis]]></category>
		<category><![CDATA[office of Civil Rights]]></category>
		<category><![CDATA[overall resilient healthcare information security program]]></category>
		<category><![CDATA[healthcare system]]></category>
		<category><![CDATA[Impact Advisor]]></category>
		<category><![CDATA[Shefali Mookencherry]]></category>
		<category><![CDATA[secure infrastructure]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/key-needs-for-a-resilient-healthcare-information-security-program/</guid>

					<description><![CDATA[By Jessica Davis August 26, 2020 &#8211; The Office of Civil Rights recently shared ways an IT asset inventory can create a more effective risk analysis to close information security gaps and support HIPAA [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="articles-content">
<div class="article-top-author">
<p><img decoding="async" title="healthcare sector" alt="healthcare sector" src="https://healthitsecurity.com/images/avatars/avatar_164886.jpg" class="article-top-image"/> By Jessica Davis</p>
</p></div>
<p><time datetime="2020-8-26">August 26, 2020</time> &#8211; The Office of Civil Rights recently <span data-contrast="none" xml:lang="EN-US"><span data-ccp-charstyle="Hyperlink">shared</span></span><span data-contrast="auto" xml:lang="EN-US"> ways an IT asset </span><span data-contrast="auto" xml:lang="EN-US">inventory can create a more effective risk analysis to close information security gaps and support HIPAA compliance. Given the s</span><span data-contrast="auto" xml:lang="EN-US">ophistication of the current threat landscape, these functions will prove crucial in supporting an overall resilient h</span><span data-contrast="auto" xml:lang="EN-US">ealthcare information security program.</span> </p>
<p paraeid="{f169d160-4c79-499e-8d43-0c2314fa7e24}{100}" paraid="1810676950" xml:lang="EN-US"><span data-contrast="auto" xml:lang="EN-US">While cybersecurity awareness has drastically improved across the healthcare sector, Impact Advisor’s Shefali </span><span data-contrast="auto" xml:lang="EN-US">Mookencherry</span><span data-contrast="auto" xml:lang="EN-US">, Principal Advisor and Solution Leader of Information Security, Privacy, and Disaster Recovery, explained that has not translated into a more secure infrastructure.</span> </p>
<p paraeid="{e05ff0f1-b4ee-456b-bf41-2a1280ac21a1}{53}" paraid="1200823159" xml:lang="EN-US"><span data-contrast="auto" xml:lang="EN-US">Currently, there are far too many cybersecurity considerations when it comes to making a more secure healthcare system, as internal users continue to be one of the biggest risks to the healthcare system and hacker</span><span data-contrast="auto" xml:lang="EN-US">s are increasingly improving the sophistication of their phishing campaigns, she added.</span><span data-contrast="auto" xml:lang="EN-US"> And those threats have rapidly increased amid the COVID-19 pandemic.</span> </p>
<p paraeid="{b23d72eb-3320-4cff-bb0e-4bd8f10be81e}{136}" paraid="349550754" xml:lang="EN-US"><span data-contrast="auto" xml:lang="EN-US">In the last week alone, reports from security </span><span data-contrast="none" xml:lang="EN-US"><span...</span></span></p>
</div>
<p><a href="https://healthitsecurity.com/news/key-needs-for-a-resilient-healthcare-information-security-program">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>3 Key Ways to Bolster Healthcare Cybersecurity with MFA, Training</title>
		<link>https://risk-academy.ru/3-key-ways-to-bolster-healthcare-cybersecurity-with-mfa-training/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 24 Jun 2020 19:23:54 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[cloud services]]></category>
		<category><![CDATA[Workforce]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Federal Bureau of Investigation]]></category>
		<category><![CDATA[mobile devices]]></category>
		<category><![CDATA[healthcare sector]]></category>
		<category><![CDATA[National Initiative for Cybersecurity Education]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[Jessica Davis]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/3-key-ways-to-bolster-healthcare-cybersecurity-with-mfa-training/</guid>

					<description><![CDATA[By Jessica Davis Throughout the course of the first half of 2020, the FBI, the Department of Homeland Security, and a number of security agencies ramped up cybersecurity alerts—many of [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="articles-content">
<div class="article-top-author">
<p><img decoding="async" title="Computer network security" alt="Computer network security" src="https://healthitsecurity.com/images/avatars/avatar_164886.jpg" class="article-top-image"/> By Jessica Davis</p>
</p></div>
<p dir="ltr"><span id="docs-internal-guid-b6c4a673-7fff-699d-f6e3-927db2c29627">Throughout the course of the first half of 2020, the FBI, the Department of Homeland Security, and a number of security agencies ramped up cybersecurity alerts—many of which directed at the healthcare sector—in an effort to support vulnerable industries responding to the COVID-19 crisis. In response, hackers steadily worked to target the rapid rise in telework and telehealth.</span></p>
<p dir="ltr"><span id="docs-internal-guid-b6c4a673-7fff-699d-f6e3-927db2c29627">While the number of </span>reported cybersecurity incidents in the healthcare sector are fewer than in previous years, it does not mean the number of attacks have declined. Security researchers and federal agencies have all reported rises in cyberattacks on cloud services, remote platforms, mobile devices, and other endpoints.</p>
<p dir="ltr"><span id="docs-internal-guid-b6c4a673-7fff-699d-f6e3-927db2c29627">For the healthcare sector, already burdened with the Coronavirus response, the expanded threat landscape could lead to some serious issues down the line. Fortunately, the majority of these </span>advisories contain key elements that could allow enterprises to effectively close some of these critical gaps.</p>
<h3 dir="ltr"><strong><span id="docs-internal-guid-b6c4a673-7fff-699d-f6e3-927db2c29627">Multi-Factor Authentication</span></strong></h3>
<p dir="ltr"><span id="docs-internal-guid-b6c4a673-7fff-699d-f6e3-927db2c29627">A report from Microsoft found that 99.9 </span>percent of all&#8230;</p>
</div>
<p><a href="https://healthitsecurity.com/news/3-key-ways-to-bolster-healthcare-cybersecurity-with-mfa-training">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Reducing Risk of Temporary Hospitals, Remote Care</title>
		<link>https://risk-academy.ru/reducing-risk-of-temporary-hospitals-remote-care/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 10 Jun 2020 19:05:44 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[healthcare facilities]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[healthcare sector]]></category>
		<category><![CDATA[Virtual Private Networks]]></category>
		<category><![CDATA[healthcare organizations]]></category>
		<category><![CDATA[BitSight]]></category>
		<category><![CDATA[Jessica Davis]]></category>
		<category><![CDATA[vice president of Communications and Government Affairs]]></category>
		<category><![CDATA[remote technologies]]></category>
		<category><![CDATA[Jake Olcott]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/reducing-risk-of-temporary-hospitals-remote-care/</guid>

					<description><![CDATA[By Jessica Davis June 10, 2020 &#8211; The COVID-19 pandemic has fueled the pace of change in the healthcare sector, from telehealth expansion to the rapid deployment of temporary hospitals. But [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="articles-content">
<div class="article-top-author">
<p><img decoding="async" title="healthcare" alt="healthcare" src="https://healthitsecurity.com/images/avatars/avatar_164886.jpg" class="article-top-image"/> By Jessica Davis</p>
</p></div>
<p><time datetime="2020-6-10">June 10, 2020</time> &#8211; The COVID-19 pandemic has fueled the pace of change in the healthcare sector, from telehealth expansion to the rapid deployment of temporary hospitals. But the increase in telework, mobile tech, remote care, and temporary hospitals has also expanded the threat landscape, which could have lasting consequences.</p>
<p>Indeed, cybercriminals have rapidly worked to take advantage of the new landscape, targeting virtual private networks (VPNs), cloud service platforms, and remote workers in an effort to financially benefit from the pandemic.</p>
<p>Given the pace and scope of the deployment of remote technologies and temporary sites, healthcare organizations should be closely monitoring its systems to ensure they’re protected from these new threats.</p>
<p>“Because these healthcare facilities are essentially an extension of the healthcare industry (i.e. hospitals and doctors’ offices), they offer hackers a lot more room to work with,” Jake Olcott, BitSight vice president of Communications and Government Affairs. “Given this, the hackers specifically targeting the healthcare&#8230;</p>
</div>
<p><a href="https://healthitsecurity.com/news/covid-19-security-reducing-risk-of-temporary-hospitals-remote-care">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
