< >
  • Recent Health IT Security Articles

    • Ponemon study analyzes data breach preparedness trends

      The Ponemon Institute's Second Annual Study on Data Breach Preparedness gauged 567 cross-vertical executives' confidence in their organizations' ability to respond to data breaches. Compared to last year's findings, organizations appear to be making pr...

    • Bronx RHIO implements direct secure messaging

      Maintaining security standards as Health Information Exchange (HIE) expansion continues is critical for any healthcare provider. It’s also essential that patient data stays secure as it is transported from one organization to the next. Those necessit...

    • NH-ISAC, SANS align cybersecurity information sharing expertise

      The National Health Information Sharing & Analysis Center (NH-ISAC) and SANS Institute announced today that they have partnered to help healthcare organizations stay ahead of the latest cybersecurity threats. The NH-ISAC, which is also working...

    • How are hospitals handling medical device security?

      Dale Nordenberg, moderator of the medical device security panel discussion at this year's HIMSS Privacy and Security Forum, made an interesting point in saying that medical devices fit somewhere between BioMed, IT and security. Given the likelihood th...

    • Flowers Hospital data breach suit: Plaintiffs to amend complaint

      A former Flowers Hospital lab technician was indicted in early September on charges that he stole eight patients' protected health information (PHI) as part of an alleged tax fraud scheme from June 2013 to February 2014. As a result of the breach, five...

    • How valuable are medical records to identity thieves?

      Social security numbers and credit card numbers are often thought of as key pieces of information for thieves to have in terms of identity theft, but recent reports show that there is something worth a lot more floating around in cyberspace: medical re...

    • FDA, NH-ISAC to share medical device cybersecurity tips, risks

      As evidenced by the recent announcement of its medical device and cybersecurity workshop on October 21 and 22, 2014, Food and Drug Administration (FDA) is taking medical device cybersecurity seriously. This stance is further supported by the FDA's part...

    • Enacting healthcare BYOD policies while avoiding risks

      Did you know that 24,800 patients' medical data could be exposed to abuse today? According to the Department of Health and Human Services (HHS), that is the number of people whose protected health information was breached per day on average in 2013. ...

    • HIMSS Privacy and Security Forum 2014: Industry trends

      This year's HIMSS Privacy and Security Forum, which took place Sept. 8-9, 2014 in Boston, encompassed a wide range of subjects and healthcare trends. But many of healthcare's newest security challenges were discussed in great depth by C-level executiv...

    • HITRUST: Shellshock vulnerability more serious than Heartbleed

      The value in cyber threat information sharing is never more apparent than when a serious vulnerability arises. The HITRUST Cyber Threat Intelligence and Incident Coordination Center (C3) released a report with the most up-to-date analysis on the Shells...

  • News Archives

    no, thanks

    Sign up for our free HealthITSecurity.com newsletter and stay up to date with tips and advice on:

    • HIPAA
    • BYOD
    • Data Security
    • VDI
    • Cloud Security

    Our privacy policy