Healthcare Information Security
  • The Role of HIM Professionals in HIPAA Compliance

    September 22, 2016 - Individuals in the health information management (HIM) field play a critical role in covered entities’ approaches to data security, especially HIPAA compliance. HIM professionals are often “acquiring, analyzing, and protecting digital and traditional medical information vital to providing quality patient care,” according to The American Health Information Management Association...

  • Coordinating Healthcare Data Center Security, Cloud Security

    September 15, 2016 - The modern healthcare IT environment has quickly become the home of next-generation technologies. Still, the proliferation of cloud computing and the data-on-demand generation has created new types of challenges for today’s healthcare IT environments. Not only do administrators have to focus on creating robust, multi-tenant platforms, they must always take end-user performance, resource...

  • Secure Texting, App Security Top Mobile Health Topics

    September 14, 2016 - With more covered entities beginning to consider secure texting options or BYOD implementation, it makes sense that certain app security and mobile health security concerns also arise. However, the implementation process can be done securely, and organizations can take advantage of technical innovations to stay connected and further patient care. Facilities just need to ensure they consider...

  • Necessary Skills for Healthcare IT Security Professionals

    September 12, 2016 - So you work in the healthcare IT security world. Have you seen some changes? Are you noticing more users requesting complex applications? Maybe you’re starting to deploy more compliance-ready cloud systems. Or, you could be utilizing new digital tools to help deliver powerful healthcare services. Whichever way you position it, healthcare IT security is changing. Rather, it has already...


Today's Top Stories

Are More State Data Breach Notification Laws Recognizing PHI?

Federal regulations, such as HIPAA and the HITECH Rule, garner the majority of attention when it comes to the data breach notification process. However, state laws also exist, and tend to vary. Covered entities and business associates must ensure...

The Role of HIM Professionals in HIPAA Compliance

Individuals in the health information management (HIM) field play a critical role in covered entities’ approaches to data security, especially HIPAA compliance. HIM professionals are often “acquiring, analyzing, and protecting digital...

Healthcare Web Application Attacks Increase in Past Year

There has been a 14 percent increase in overall web application attacks from Q1 2016 to Q2 2016, while healthcare web application attacks have also increased in the past year, according to recent research from Akamai. DDoS attacks also increased...

Unauthorized HIE Access Leads to MA Data Security Incident

Massachusetts-based Codman Square Health Center is notifying patients that some of their information may have been exposed after a data security incident stemming from unauthorized HIE access. Codman was notified on July 13, 2016 that an employee...

How Expensive are Cybersecurity Attacks, Data Breaches?

While cybersecurity attacks and other data security incidents are on the rise, the actual costs of these types of scenarios are far less than previously reported, according to research from the Journal of Cybersecurity. Researchers examined over...

Healthcare Cybersecurity Task Force Seeks Industry Input

The recently appointed Healthcare Cybersecurity Task Force is hoping that a crowdsourcing approach will draw in the necessary advice and insight for how the group can best implement change to keep the healthcare industry secure against evolving...

Why Healthcare is a ‘Sitting Duck’ in Data Protection Measures

Healthcare organizations and manufacturers are very vulnerable when it comes to their data protection measures, according to the Intel Security 2016 Data Protection Benchmark Study.   While the gap between data loss and breach discovery...

View all stories

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks