HealthITSecurity.com > EHR Security

EHR Security

This year’s HIMSS Privacy and Security Forum, which took place Sept. 8-9, 2014 in Boston, encompassed a wide range of subjects and healthcare more »

The value in cyber threat information sharing is never more apparent than when a serious vulnerability arises. The HITRUST Cyber Threat Intelligence more »

Some security risks within a healthcare organization are more apparent than others, but those underlying threats are no less significant. Fernando Martinez, more »

The Office of Inspector General (OIG) applauded Federal, Kentucky, and New Mexico Health Insurance Exchanges (HIX) for implementing varying levels of security controls. more »

The Food and Drug Administration (FDA) announced on Tuesday, Sept. 23 that it will hold a public workshop to help healthcare organizations more »

The day that Ed Marx, CIO of Texas Health Resources, got his organization’s senior executives’ attention about security was when he showed more »

As more healthcare organizations move towards a cloud computing and virtualization-enabled environment, applications continue to remain a big concern. Emerging trends clearly more »

More details surrounding the Centers for Medicare and Medicaid Services (CMS) hurried HealthCare.gov launch last fall are emerging. The most recent, Rep. more »

Drew Memorial Hospital (DMH) of Monticello, Arkansas may have to pay back more than $900,000 of its Stage 1 meaningful use (MU) payment more »

HITRUST released its monthly Cyber Threat Intelligence and Incident Coordination Center (C3) report today, which looked at two of the biggest incidents in more »

BOSTON – Medical identity theft, fraud and negligence are prevalent healthcare data breaches these days because of the integration of financial data more »

According to the U.S. Government Accountability Office (GAO), the Centers for Medicare and Medicaid Services (CMS) has made strides in addressing HealthCare.gov more »

Last week, we discussed the three core components to the National Institute of Standard and Technology (NIST) Cyber Security Framework (CSF): the more »

BOSTON – Boston Children’s Hospital was fairly quiet about its run-in last spring with the hacktivist group Anonymous until recently, but now it more »

The Internet of Things (IoT) is a strong cross-industry term that is getting a lot of hype these days, but a recent more »

The Community Health Systems, Inc. breach involving 4.5 million patient records is part of an alarming trend in healthcare. Across the nation, more »

If they haven’t been hacked already, healthcare organizations are undoubtedly hearing cyber criminals’ footsteps. But what are these organizations seeing from hackers more »

BOSTON – Jim Routh, Aetna Chief Information Security Officer (CISO) challenged today’s HIMSS Privacy and Security Forum audience to take risks in more »

The Centers for Medicare and Medicaid Services (CMS) made news recently when it denied an Associated Press (AP) request for information about HealthCare.Gov more »

HITRUST released the pertinent information and participant numbers for its CyberRX 2.0 program today, announcing that more than 750 healthcare organizations signed more »

The umbrella vendor statement “we encrypt all of our data” isn’t enough to satisfy HIPAA regulations, nor is it sufficient for a more »

Data encryption in healthcare isn’t necessarily a cure-all, as top-flight hackers can crack encryption keys with relative ease. But there is obvious more »

Risk assessment is something we all do in healthcare and in our daily lives. Consider crossing the road. Should you cross at more »

The IBM X-Force recently released its Threat Intelligence Quarterly report for Q3 2014 and analyzed how the Heartbleed vulnerability affected its Managed more »

The well-known Community Health Systems, Inc. (CHSI) data breach that compromised 4.5 million patient data was a result of the OpenSSL Heartbleed more »

no, thanks

Sign up for our free HealthITSecurity.com newsletter and stay up to date with tips and advice on:

  • HIPAA
  • BYOD
  • Data Security
  • VDI
  • Cloud Security

Our privacy policy