Healthcare Information Security
  • Going On the Offensive in Healthcare Cybersecurity

    June 22, 2016 - I don’t think anyone needs much more convincing when it comes to healthcare cybersecurity. It’s clear that healthcare is under attack by a host of different cyber criminals who seek to steal and monetize its information, extort it for financial gain, and compromise its networks and data for state-sponsored cyber espionage and hacktivism. Adding to the problem is the costs of these...

  • Why Facilities Need to Understand Healthcare Cyber Liability

    June 22, 2016 - No healthcare organization wants to experience a data breach, but there can often be unforeseen events that occur after a security incident. This is where healthcare cyber liability can come into play, but covered entities cannot assume that all insurance policies are the same. Without a thorough understanding of its own potential risks, it will be more difficult to fine tune a healthcare...

  • Why Healthcare Cloud Management is a Top Industry Concern

    June 17, 2016 - The healthcare sphere is increasingly a data-driven and interconnected system of information sharing ranging from patient electronic health records to cost and value metrics, clinical trial sets, readmission rates and even genomic sequencing. This is why healthcare cloud management solutions have become a more critical aspect to the healthcare IT space. A 2014 EMC report indicated that the...

  • Preparing Against Current Healthcare Cybersecurity Threats

    June 16, 2016 - As more healthcare ransomware cases are reported, it becomes even more apparent that organizations of all sizes can no longer assume that they will never be a target of a healthcare cybersecurity attack. Covered entities must ensure that they are properly prepared for a potential ransomware or other type of cybersecurity attack, explained Berkeley Research Group Director of Cyber Security...


Today's Top Stories

EHR Data Potentially Exposed in Vendor Healthcare Data Breach

Another medical center has reported a potential healthcare data breach stemming from a hacking incident affecting EHR vendor Bizmatics, according to a HIPAA notification letter on the ENT and Allergy Center’s website. The Office of Civil...

Going On the Offensive in Healthcare Cybersecurity

I don’t think anyone needs much more convincing when it comes to healthcare cybersecurity. It’s clear that healthcare is under attack by a host of different cyber criminals who seek to steal and monetize its information, extort it...

Why Facilities Need to Understand Healthcare Cyber Liability

No healthcare organization wants to experience a data breach, but there can often be unforeseen events that occur after a security incident. This is where healthcare cyber liability can come into play, but covered entities cannot assume that...

ONC Urges Mobile Application Security, Regulatory Adherence

The potential legal concerns and mobile application security should be key considerations as technologists, clinicians, or even patients work on developing healthcare applications, according to Office of the National Coordinator (ONC) leaders....

HIPAA Minimum Necessary Standard Discussed in Hearing

The National Committee on Vital and Health Statistics’ (NCVHS) subcommittee on privacy, confidentiality, and security held a hearing last week to help the Department of Health and Human Services (HHS) develop better guidance on the HIPAA...

IL Data Breach Notification Law to Include Healthcare Data

Last month, Illinois Governor Bruce Rauner signed several amendments to a data breach notification law that would impact healthcare data security regulations starting in 2017. Under the revised Personal Information Privacy Act, protected personal...

How Do HIPAA Rules, Patient Privacy Apply in Emergencies?

No healthcare organization wants to compromise patient privacy, and HIPAA rules were designed to ensure that this does not occur.   Covered entities of all sizes should understand how the HIPAA Privacy Rule applies in various situations....

View all stories

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks