HIPAA, Patient Privacy, Healthcare Data Security BYOD
  • What Happens in HIPAA Audits: Breaking Down HIPAA Rules

    May 29, 2015 - HIPAA audits are something that covered entities of all sizes must be prepared to potentially go through. As technology continues to evolve, facilities need to ensure that they are maintaining PHI security and understand how best to keep sensitive information secure. The Department of Health & Human Services (HHS) Office for Civil Rights (OCR) had originally scheduled its second round...

  • How Healthcare Can Create a Secure Hybrid Cloud

    May 26, 2015 - There is a visible change happening within the modern healthcare architecture. New types of users, applications and use-cases are all emerging and pushing business drivers forward. One of the biggest impactors of the modern business is, of course, the cloud. Originally, there was a flawed perception of cloud computing as being one large phenomenon. Rather, cloud computing is actually a spectrum...

  • Important Lessons for Health Data Privacy, Security in 2015

    May 21, 2015 - Health data privacy and security issues are not going to disappear anytime soon, and will likely continue to evolve along with technology. Covered entities need to keep their privacy and security measures current, especially as they integrate new systems and devices into their daily routines. While the Anthem and Premera data breaches were not shining moments for the healthcare industry, several...

  • Breaking Down the Evolution of Healthcare Phishing Scams

    May 18, 2015 - Healthcare phishing scams can lead to numerous issues for organizations, and can have long-lasting effects. Employees need to be trained properly on how to detect phishing scams, but healthcare organizations must also have the necessary technology in place to help employees remain vigilant. Phishing scams that target the healthcare industry have evolved over the years, according to Patricia...


Today's Top Stories

What Happens in HIPAA Audits: Breaking Down HIPAA Rules

HIPAA audits are something that covered entities of all sizes must be prepared to potentially go through. As technology continues to evolve, facilities need to ensure that they are maintaining PHI security and understand how best to keep sensitive...

VA PHI Incidents Increase 178% in April

After a positive few months that showed a decrease in PHI incidents, the Department of Veterans Affairs (VA) saw a drastic uptick in reported data security events, according to its latest report to Congress. In March, the VA stated that 383 veterans...

Health Data Security Risks Hinder Stage 3 MU, Says AHA

Certain health data security risks are part of the reason that the American Hospital Association (AHA) said that it is not yet ready for Stage 3 Meaningful Use to be implemented. While overall it agrees with the proposed Stage 3 Meaningful Use...

CHIME Urges Health Data Privacy in ONC Certification Comments

Health data sharing is an important aspect of health reform, but it needs to be done with privacy and security issues in mind. That point was further underlined by The College of Healthcare Information Management Executives (CHIME) when it submitted...

Healthcare Data Breaches Have Highest Cost, Says Ponemon

Healthcare data breaches average the highest cost per stolen record, with organizations reaching as high as $363, according to Ponemon’s annual Cost of Data Breach Study: Global Analysis, sponsored by IBM. For the US specifically,...

Medical Management Data Breach Impacting Multiple States

Last week, we reported on a healthcare data breach where a third party facility, Medical Management LLC, connected with the University of Pittsburgh Medical Center (UPMC) reported that approximately 2,200 UPMC patients may have had their records...

North Dakota Data Breach Notification Law Amended

Data breach notification laws continue to be implemented and amended across the country, as North Dakota becomes the latest state to clarify its regulations on privacy and security. North Dakota Governor Jack Dalrymple recently signed SB 2214...

View all stories

X

Sign up for our free HealthITSecurity.com newsletter and stay up to date with tips and advice on:

HIPAA
BYOD
Data Security
VDI
Cloud Security

Our privacy policy

no, thanks