< >
  • Recent Health IT Security Articles

    • DeSalvo Leaves ONC for HHS Role

      Yesterday, National Coordinator Karen DeSalvo announced that she was leaving her role at the Office of the National Coordinator to become the new acting assistant secretary of health for the Department of Health and Human Services (HHS). HHS Secret...

    • Why Protecting PHI Must Be Top a Priority for the IRS

      The IRS must work harder to keep PHI protected, according to a report by the Treasury Inspector General for Tax Administration. While the Internal Revenue Service (IRS) is authorized to disclose limited tax information to the HIEs and marketplaces cre...

    • Are There Cybersecurity Flaws in Medical Devices?

      The US Department of Homeland Security is investigating approximately two dozen cases of suspected cybersecurity flaws in medical devices. Can a hacker actually break through the cybersecurity platforms on current medical devices? That is the question...

    • Why Health Data Security Requires Detection and Prevention

      With new healthcare data breaches being reported on a weekly basis, it might seem that organizations in the industry are struggling with their health data security. However, not all industry experts are entirely pessimistic. By implementing strong admi...

    • One Year after Data Breach, FDA System Still Vulnerable

      The OIG revealed that the FDA’s computer network is vulnerable to a potential data breach. A recent audit by the Office of the Inspector General (OIG) revealed that the Food and Drug Administration’s (FD) computer network is vulnerable to a potent...

    • CMS Updates Security Risk Analysis Procedure

      Healthcare organizations need to remain up-to-date on the guidelines for proper security risk analysis. Conducting a security risk analysis is part of the core objectives that healthcare organizations must meet for Stage 1 and Stage 2 Meaningful Use. ...

    • Factoring Security Into Health Data Disclosure Management

      As IASIS Healthcare continues to architect its system more toward ensuring that there is accurate information being sent to the requesting parties, it must consider data security as well. A few years ago, IASIS started to look for companies that wou...

    • HIPAA Business Associate Agreements: What Needs to be Included?

      Healthcare organizations should take the time to review the regulations for HIPAA Business Associate Agreements. The deadline for all HIPAA business associate agreements (BAAs) to be up to date and in line with the regulations set forth by the Omnibus...

    • EY Principal: Strong EHR Security Essential for Healthcare

      Eileen Erdos, a principal in the EY Fraud Investigation & Dispute Services’ Life Sciences practice, spoke with HealthITSecurity.com about the importance of EHR security. Without strong EHR security, it could be extremely difficult to not only pr...

    • Are Small Healthcare Facilities Prepared for Data Breaches?

      A recent study found that smaller healthcare facilities could potentially be at a greater risk for data breaches. Regardless of a healthcare provider’s size, it can be susceptible to data breaches if the proper precautions are not taken. Even if all...

  • News Archives