HealthITSecurity.com > EHR Security

EHR Security

The day that Ed Marx, CIO of Texas Health Resources, got his organization’s senior executives’ attention about security was when he showed more »

As more healthcare organizations move towards a cloud computing and virtualization-enabled environment, applications continue to remain a big concern. Emerging trends clearly more »

More details surrounding the Centers for Medicare and Medicaid Services (CMS) hurried HealthCare.gov launch last fall are emerging. The most recent, Rep. more »

Drew Memorial Hospital (DMH) of Monticello, Arkansas may have to pay back more than $900,000 of its Stage 1 meaningful use (MU) payment more »

HITRUST released its monthly Cyber Threat Intelligence and Incident Coordination Center (C3) report today, which looked at two of the biggest incidents in more »

BOSTON – Medical identity theft, fraud and negligence are prevalent healthcare data breaches these days because of the integration of financial data more »

According to the U.S. Government Accountability Office (GAO), the Centers for Medicare and Medicaid Services (CMS) has made strides in addressing HealthCare.gov more »

Last week, we discussed the three core components to the National Institute of Standard and Technology (NIST) Cyber Security Framework (CSF): the more »

BOSTON – Boston Children’s Hospital was fairly quiet about its run-in last spring with the hacktivist group Anonymous until recently, but now it more »

The Internet of Things (IoT) is a strong cross-industry term that is getting a lot of hype these days, but a recent more »

The Community Health Systems, Inc. breach involving 4.5 million patient records is part of an alarming trend in healthcare. Across the nation, more »

If they haven’t been hacked already, healthcare organizations are undoubtedly hearing cyber criminals’ footsteps. But what are these organizations seeing from hackers more »

BOSTON – Jim Routh, Aetna Chief Information Security Officer (CISO) challenged today’s HIMSS Privacy and Security Forum audience to take risks in more »

The Centers for Medicare and Medicaid Services (CMS) made news recently when it denied an Associated Press (AP) request for information about HealthCare.Gov more »

HITRUST released the pertinent information and participant numbers for its CyberRX 2.0 program today, announcing that more than 750 healthcare organizations signed more »

The umbrella vendor statement “we encrypt all of our data” isn’t enough to satisfy HIPAA regulations, nor is it sufficient for a more »

Data encryption in healthcare isn’t necessarily a cure-all, as top-flight hackers can crack encryption keys with relative ease. But there is obvious more »

Risk assessment is something we all do in healthcare and in our daily lives. Consider crossing the road. Should you cross at more »

The IBM X-Force recently released its Threat Intelligence Quarterly report for Q3 2014 and analyzed how the Heartbleed vulnerability affected its Managed more »

The well-known Community Health Systems, Inc. (CHSI) data breach that compromised 4.5 million patient data was a result of the OpenSSL Heartbleed more »

News of Community Health Systems, Inc. (CHSI) experiencing a 4.5-million patient data breach sent ripples through the healthcare industry because of both more »

The Centers for Medicare and Medicaid Services (CMS) refused an Associated Press (AP) request for information regarding HealthCare.Gov security under the Freedom of more »

Being proactive in healthcare IT security means picking out risks before incidents occur, not after the fact. But the challenge is that potential more »

While there aren’t new healthcare IT security education or collaboration programs or being announced on a weekly basis, it seems as though more »

The HIMSS Electronic Health Record Association (EHRA) responded earlier this week to Senate Finance Committee members Ron Wyden and Chuck Grassley’s request more »

no, thanks

Sign up for our free HealthITSecurity.com newsletter and stay up to date with tips and advice on:

  • HIPAA
  • BYOD
  • Data Security
  • VDI
  • Cloud Security

Our privacy policy