• Today's Top Stories

    488640953

    Best Practices for Creating a Strong Patient Portal

    As patient-centric models become the norm, tools like patient portals are increasing in popularity. With technology continuously evolving, it has never been more critical for more »...
    Healthcare and Law

    Former HealthCare.gov Official Subpoenaed Over Health Security Issues

    A subpoena was issued for former US Chief Technology Officer Todd Park and his role in overseeing the launch of HealthCare.gov. Former US Chief Technology more »...
    2014-10-29-187170812

    How Health Data Security Benefits from Industry Sharing

    Health data security is not a new issue in the healthcare sector, but with health information exchanges (HIEs) springing up all over the country, facilities more »...
    155787343

    Will Healthcare Interoperability Issues Follow DeSalvo Departure?

    The AMA hopes that recent ONC departures will not create healthcare interoperability issues. The American Medical Association (AMA) believes that the departure of National Coordinator more »...
    466155589

    HITRUST Common Security Framework: Tips for Healthcare Facilities

    The HITRUST Common Security Framework (CSF) is an important tool that healthcare organizations of all sizes can use in their approach to regulatory compliance and more »...
    Medical Record Privacy

    Health Data Encryption is Critical Aspect for PHI Security

    In an effort to keep patient information secure, more healthcare organizations are calling for health data encryption precautions. New Jersey even announced recent legislation that more »...
    iPad

    PHI Encryption Necessary, Says Proposed NJ Bill

    Health insurers should be required to encrypt patients’ protected health information, according to a proposed bill in New Jersey. Personal health information (PHI) should be more »...

    Featured Health IT Interviews

    Sign up for our free HealthITSecurity.com newsletter and stay up to date with tips and advice on:

    • HIPAA
    • BYOD
    • Data Security
    • VDI
    • Cloud Security

    Our privacy policy