Articles

California enacted legislation, AB 658, earlier this year to shield patient health information stored in personal health records personal health records (PHRs) and more »

The Ponemon Institute’s Second Annual Study on Data Breach Preparedness gauged 567 cross-vertical executives’ confidence in their organizations’ ability to respond to more »

Maintaining security standards as Health Information Exchange (HIE) expansion continues is critical for any healthcare provider. It’s also essential that patient data more »

The National Health Information Sharing & Analysis Center (NH-ISAC) and SANS Institute announced today that they have partnered to help healthcare organizations stay more »

Dale Nordenberg, moderator of the medical device security panel discussion at this year’s HIMSS Privacy and Security Forum, made an interesting point in more »

A former Flowers Hospital lab technician was indicted in early September on charges that he stole eight patients’ protected health information (PHI) more »

Social security numbers and credit card numbers are often thought of as key pieces of information for thieves to have in terms more »

As evidenced by the recent announcement of its medical device and cybersecurity workshop on October 21 and 22, 2014, Food and Drug more »

Did you know that 24,800 patients’ medical data could be exposed to abuse today? According to the Department of Health and Human more »

This year’s HIMSS Privacy and Security Forum, which took place Sept. 8-9, 2014 in Boston, encompassed a wide range of subjects and healthcare more »

The value in cyber threat information sharing is never more apparent than when a serious vulnerability arises. The HITRUST Cyber Threat Intelligence more »

As healthcare organizations continue to move on from pager-based clinical messaging and begin to take advantage of smart phone technology, ensuring staff more »

With more attention being placed on mHealth and medical device security, the Food and Drug Administration (FDA) chose a good time to more »

Some security risks within a healthcare organization are more apparent than others, but those underlying threats are no less significant. Fernando Martinez, more »

Owensboro Medical Practice is currently conducting an internal investigation into a data breach that exposed 3,000 patients’ data. There are conflicting reports more »

The Office of Inspector General (OIG) applauded Federal, Kentucky, and New Mexico Health Insurance Exchanges (HIX) for implementing varying levels of security controls. more »

The Food and Drug Administration (FDA) announced on Tuesday, Sept. 23 that it will hold a public workshop to help healthcare organizations more »

The American Health Information Management Association’s (AHIMA) released its Breach Management Toolkit earlier in 2014 and will offer a session on how to more »

The day that Ed Marx, CIO of Texas Health Resources, got his organization’s senior executives’ attention about security was when he showed more »

As more healthcare organizations move towards a cloud computing and virtualization-enabled environment, applications continue to remain a big concern. Emerging trends clearly more »

More details surrounding the Centers for Medicare and Medicaid Services (CMS) hurried HealthCare.gov launch last fall are emerging. The most recent, Rep. more »

Now that Apple has publicized its iOS 8 mobile device privacy and security features that rely on encryption and consent, Google followed more »

Drew Memorial Hospital (DMH) of Monticello, Arkansas may have to pay back more than $900,000 of its Stage 1 meaningful use (MU) payment more »

The Department of Health and Human Services (HHS) released new HIPAA Privacy Rule guidance following the United States v. Windsor holding that more »

HITRUST released its monthly Cyber Threat Intelligence and Incident Coordination Center (C3) report today, which looked at two of the biggest incidents in more »

no, thanks

Sign up for our free HealthITSecurity.com newsletter and stay up to date with tips and advice on:

  • HIPAA
  • BYOD
  • Data Security
  • VDI
  • Cloud Security

Our privacy policy