Healthcare Information Security
  • Preparing Against Current Healthcare Cybersecurity Threats

    July 29, 2016 - It’s hard to believe that anyone would think of anonymous hackers taking down websites and disrupting networks just for fun as the good old days, but in many ways they were. At least compared to today. This is especially true when it comes to healthcare cybersecurity threats, as covered entities are often holding numerous amounts of sensitive data that third-party attackers find extremely...

  • Utilizing a Secure Healthcare Cloud in Your Organization

    July 27, 2016 - There was a period in time when cloud computing and many of its associated services were pretty much off limits to organizations bound by compliance, regulations, or even strict data management policies. Today, that conversation is significantly different. Healthcare organizations are using technology not only to improve advanced patient care services, they’re also creating real-world...

  • Latest Round of OCR HIPAA Audits Not a Reason for Panic

    July 25, 2016 - The second round of the OCR HIPAA audits is officially underway, with desk audits being announced in July 2016. Notification letters were sent out to 167 covered entities on Monday, July 11, that they had been selected for the desk audit portion of the program. Specifically, the desk audits will review how healthcare organizations adhere to the HIPAA Privacy, Security, and Breach Notification...

  • IT Consumerization and its Impact on Healthcare Data Security

    July 20, 2016 - As you walk through today’s modern hospitals and healthcare environments you’ll notice a very obvious trend, and one that will affect healthcare data security. Healthcare organizations are revolutionizing patient and health delivery systems by incorporating digitization to accomplish amazing things. The big driver behind this has been the very competitive healthcare industry; and...


Today's Top Stories

OCR Clarifies HIPAA Desk Audits, Unique Device Identifiers

With the Office for Civil Rights (OCR) announcing the HIPAA desk audits earlier this month, the Department of Health and Human Services (HHS) wanted to ensure that covered entities fully understand the process and how it will potentially affect...

Preparing Against Current Healthcare Cybersecurity Threats

It’s hard to believe that anyone would think of anonymous hackers taking down websites and disrupting networks just for fun as the good old days, but in many ways they were. At least compared to today. This is especially true when it comes...

NIST Urges End of SMS Messaging in Two-Factor Authentication

Using SMS messaging in two-factor authentication has the risk that information may be intercepted or redirected, and other alternatives should instead be considered, according to a National Institute of Standards and Technology (NIST) draft guide....

Stolen Patient Records in OH Lead to Potential PHI Breach

An Ohio-area dental practice has notified 7,784 individuals of a potential PHI breach after patient records were stolen, reported the Office of Civil Rights on its website. In a HIPAA breach notification letter, Sunbury Plaza Dental explained...

Healthcare Ransomware Leads Other Industries by Large Margin

As the healthcare industry continues to implement new technologies, there are more options for unauthorized third-party attackers to try and infiltrate networks in order to access sensitive data, such as patient PHI. However, a recent study shows...

Utilizing a Secure Healthcare Cloud in Your Organization

There was a period in time when cloud computing and many of its associated services were pretty much off limits to organizations bound by compliance, regulations, or even strict data management policies. Today, that conversation is significantly...

Most Hospitals Consider EHR Security in Contingency Planning

Nearly two-thirds of hospitals reported that EHR security is considered through their application of  HIPAA rules as they implement contingency planning, the Office of Inspector General found. Furthermore, when it comes to EHR contingency...

View all stories

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks