NYS DOH Cybersecurity Regulation Deadline Fast Approaching
Next month, the New York State Department of Health (DOH) cybersecurity regulation for general hospitals comes into force, and all covered hospitals will be required to comply with all the new requirements. The cybersecurity regulation (10 NYCRR 405.46) took effect on October 2, 2024, and with immediate effect, general hospitals had to implement policies and procedures for reporting a material cybersecurity incident to the New York Department of Health’s Surge Operations Center (SOC) within 72 hours. Covered hospitals were given a year to implement compliance programs covering the other new requirements, and the deadline for compliance is now less than a month away. The compliance deadline is October 2, 2025. Cybersecurity Requirements for General Hospitals Hospitals in New York State already need to comply with the HIPAA Security Rule, but the cybersecurity regulation introduces many new requirements. Simply being HIPAA-compliant is no longer enough. Hospitals in the state, under HIPAA, are required to implement safeguards to ensure the confidentiality, integrity, and...
CVS Health Faces HIPAA Probe Over Alleged Use of Patient Data for Lobbying and Political Advocacy
CVS Health is facing a probe into potential HIPAA violations related to the alleged use of patient data for lobbying purposes to prevent the passing of a Louisiana state bill that could affect its business interests. The bill in question, House Bill 358 (HB 358), proposes several amendments to current pharmacy laws in Louisiana. One of the proposed amendments is prohibiting providers in the state from operating as both pharmacy benefit managers (PBMs) and individual pharmacies. A pharmacy benefit manager is an intermediary between drug companies and pharmacies that negotiates prices with the drug companies on behalf of employers and health plans. They often also manage pharmacy networks and operate mail-order pharmacies. PMBs are facing increased scrutiny over their business practices. The Federal Trade Commission (FTC) alleged that major PBMs have inflated drug prices to increase company profits, negotiating lower prices from drug companies, then marking up the drug prices at their pharmacies. According to an FTC report earlier this year, between 2017 and 2022, UnitedHealth...
Healthcare Industry Good at Preventing Serious Vulnerabilities but Lags in Remediation
Healthcare organizations are relatively unlikely to have serious cybersecurity vulnerabilities compared to other industry sectors, as they are generally good at prevention; however, when vulnerabilities are identified, healthcare lags other sectors when it comes to remediation. These are the findings from a recent analysis of penetration testing data and a survey of 500 U.S. security leaders by the Pentest-as-a-service (PTaaS) firm Cobalt. The findings are published in its State of Pentesting in Healthcare 2025 report. Serious cybersecurity vulnerabilities are relatively rare in healthcare, with the industry ranking 6th out of the 13 industries represented in the data, with only 13.3% vulnerabilities identified through pentesting qualifying as serious. When penetration tests identify serious vulnerabilities, they need to be remediated promptly. As long as a vulnerability remains unaddressed, it can potentially be exploited by a threat actor. The standard for measuring the time to perform a security action is the median time to resolve (MTTR), which, for serious vulnerabilities in...
Report Reveals Worrying Abuses of Agentic AI by Cybercriminals
Cybercriminals have been abusing agentic AI to perform sophisticated cyberattacks at scale, incorporating AI tools throughout all stages of their operations. Agentic AI tools have significantly lowered the bar for hackers, allowing individuals with few technical skills to conduct complex attacks that would otherwise require extensive training over several years and a team of operators. A new threat intelligence report from Anthropic highlights the extent to which its own language model (LLM) and AI assistant, Claude, has been abused, even with sophisticated safety and security measures in place to protect against misuse. The cybercriminal schemes identified by Anthropic have targeted businesses around the world, including U.S. healthcare providers. Examples of misuses of Claude code include: A campaign allowing large-scale theft of data from healthcare providers, emergency services, religious institutions, and the government A large-scale fraudulent employment scheme conducted by a North Korean threat actor to secure jobs at Western companies The creation and subsequent sale of...
HHS Announces Crackdown on Information Blocking in Healthcare
The Department of Health and Human Services (HHS) has announced it will start cracking down on healthcare entities that engage in information blocking. On September 3, 2025, HHS Secretary Robert F. Kennedy Jr. directed the HHS to increase resources dedicated to the enforcement of the health data information blocking provisions of the 21st Century Cures Act. The 21st Century Cures Act of 2016 established penalties, termed disincentives, for healthcare entities that engage in information blocking practices, which is “any practice that interferes with, prevents, or materially discourages access, exchange, or use of electronic health information.” The disincentive for information blocking by developers of certified health IT, Health Information Exchanges (HIEs), and Health Information Networks (HINs) is a civil monetary penalty of up to $1 million, which took effect on September 1, 2023. Developers with products certified under the ONC Health IT Certification Program could have their certifications terminated and be banned from the Certification Program. In 2023, the HHS proposed a...



