Healthcare Information Security
  • Understanding Web Application Security in Healthcare

    May 26, 2016 - The modern healthcare environment has evolved to present new types of technology services, support new kinds of users, and deliver even better healthcare services. Cloud-facing applications and EHR systems are becoming the new normal as we support new kinds of use-cases. Technologies like EPIC already run, and are standardized, on systems like Citrix XenApp, where the entire app is virtualized...

  • ICIT Explains NIST Guide Impact on Healthcare Cybersecurity

    May 25, 2016 - As health IT developers work to create the latest platforms and tools for the industry, it is essential that healthcare cybersecurity measures remain a top priority. However, numerous types of healthcare organizations should take note of a guide released earlier this month that could potentially impact how the industry can keep data secure. The National Institute of Standards and Technology...

  • Creating Strong Healthcare IT Infrastructure Security

    May 23, 2016 - Security in the healthcare world continues to be a very interesting topic. We’re seeing growing concerns around data, virtual systems, and much more adoption around cloud services. At the healthcare level, new types of services are impacting patient care and how we deliver critical systems. But here’s the big question: is healthcare IT infrastructure security strong enough? With...

  • How to Protect Your Entity from Healthcare Phishing Attacks

    May 19, 2016 - We read with horror about healthcare organizations getting hacked, spilling personal health details that no one wants to find dumped out onto the public internet. The origins of these attacks are all-too-frequently healthcare phishing attacks, stemming from emails that a staff member has unwisely opened. While in theory, the obvious advice to give is that one should not click on strange links...


Today's Top Stories

Do Employee Errors Jeopardize Healthcare Data Security?

Many people have heard the adage that humans are not perfect. But, when it comes to patient information, human imperfections can lead to serious healthcare data security issues. In a recent survey from Experian Data Breach Resolution and Ponemon...

Precision Medicine Initiative Security Framework Released

A Precision Medicine Initiative Security Framework was created to ensure that healthcare organizations of all sizes understand the security expectations that must accompany the Precision Medicine Initiative (PMI), according to the Department...

Understanding Web Application Security in Healthcare

The modern healthcare environment has evolved to present new types of technology services, support new kinds of users, and deliver even better healthcare services. Cloud-facing applications and EHR systems are becoming the new normal as we support...

Vendor Healthcare Data Breach Exposes Info on 87K Patients

The Southeast Eye Institute, PA, or Eye Associates of Pinellas, has recently reported a possible healthcare data breach after an unauthorized party accessed patient files that were formerly managed by a third-party vendor. Approximately 87,314...

Cloud Computing Security Vendors for Healthcare

Data security is critical for any healthcare organization, and as technology continues to evolve, more entities are beginning to look to cloud computing security options. However, in a highly regulated industry, organizations cannot choose a...

How Rise in Phishing Attacks Affects Healthcare Data Security

Many healthcare organizations and business associates are constantly working to prevent phishing attacks from compromising healthcare data security. Yet, cyberattacks were still the top cause of healthcare data breaches in 2015 and recent studies...

ICIT Explains NIST Guide Impact on Healthcare Cybersecurity

As health IT developers work to create the latest platforms and tools for the industry, it is essential that healthcare cybersecurity measures remain a top priority. However, numerous types of healthcare organizations should take note of a guide...

View all stories