Healthcare Information Security

Features

How FDA Medical Device Cybersecurity Guidance Affects Providers

With the continued push for interoperability and integration of EHRs into daily use, connected medical devices are quickly becoming more common tools for healthcare providers. However, similar to the way computer networks and systems can become vulnerable to data security issues, medical device cybersecurity threats can be especially dangerous for covered entities.  Not only could a compromised...


More Features

State Data Breach Notification Laws Critical to Healthcare Orgs

The HIPAA Privacy, Security, and Data Breach Notification Rules require covered entities and business associates to take great care with how PHI is handled, stored, and transferred. Should patient data become compromised, healthcare organizations...

Enabling Providers to Use Truly HIPAA Compliant Email

As technology continues to evolve, healthcare organizations of all sizes are working to remain current in what they can offer to providers and patients while also keeping PHI secure. Covered entities now have various options of communication,...

How Data Encryption Benefits Data Security

As healthcare organizations continue to make the switch from physical to electronic records, implement EHRs, and connect to HIEs, healthcare data encryption options have also increased in popularity. This is when covered entities or business...

How Evolving Healthcare Cybersecurity Threats Affect Providers

As healthcare providers work to implement the latest pieces of technology to improve patient care, the healthcare cybersecurity threats will also continue to evolve. Healthcare ransomware attacks, BYOD security, and healthcare data breaches continue...

HIPAA Data Breaches: What Covered Entities Must Know

As more healthcare organizations implement new technologies, connect to health information exchanges, and adopt electronic health record technology, they are potentially exposing themselves to more online threats and potential HIPAA data breaches....

The Role of Risk Assessments in Healthcare

A risk assessment helps covered entities ensure they are compliant with the HIPAA requirements in terms of physical, technical, and administrative safeguards. It also assists in showing potential areas where an organization might be putting PHI...

Why Blockchain Technology Matters for Healthcare Security

With technological innovations continuing to find a place in the healthcare industry, health data security must remain a top priority for organizations of all sizes. More electronic data is available than ever before, and covered entities are...

What Hospitals Should Know about Cloud Computing Security

With more healthcare organizations implementing mobile devices, and increasing their digital storage options, cloud computing security is quickly becoming a top healthcare industry issue. Healthcare cybersecurity concerns can often make covered...

BYOD Security in the Healthcare Setting

With mobile devices quickly becoming an integral part of daily operations at more healthcare organizations, both covered entities and their business associates need to ensure that they fully comprehend BYOD security and overall healthcare mobile...

How Ransomware Affects Hospital Data Security

Ransomware is a type of malware that typically prevents organizations from accessing certain parts of its system. For example, an entity and its users could be locked out from critical systems, such as EHRs, and may be unable to get in unless...

What Entities Need to Know about Upcoming OCR HIPAA Audits

The latest round of OCR HIPAA audits were announced earlier this year, leading many healthcare organizations to review their HIPAA compliance measures and ensure that all necessary policies and procedures have been properly documented. The second...

Increased EHR Adoption Raises Need for Robust EHR Security

EHR security is one small piece to the larger data security puzzle that healthcare organizations, especially those of a larger size, are becoming increasingly aware of and looking to address. Under HIPAA, covered entities have the responsibility...

How Healthcare Secure Texting, Messaging Impact the Industry

With the continued push for patient-centered care and ever-evolving technological options available to healthcare providers, secure texting and secure messaging have become an increasingly popular path for providers. Not only will secure texting...

Judy Faulkner: Epic is Changing the Big Data, Interoperability Game

HealthITAnalytics In the flashy, crowded, dizzyingly large vendor halls at the annual HIMSS Conference and Exhibition, attendees tend to find their way around by using some of the biggest, tallest, or most unique booths as a compass.  A left at Cerner; a...

How Do Patient Portals and Personal Health Records Differ?

PatientEngagementHIT Patient portals and personal health records (PHRs) have both received considerable praise for their role in increasing patient engagement. However, distinguishing between the two forms of health IT tools can often be difficult, due to nebulous...

Examining the Rocky Road to Telehealth Parity

mHealthIntelligence Telehealth advocates have long argued that online and digital healthcare should be treated the same as in-person healthcare. But the call for parity isn’t so simple. Parity in telehealth is approached on two levels: Service and payment....

Considerations for Deploying Healthcare Wireless Networks

HITInfrastructure Wireless networks are the lifeblood health IT infrastructure, but developing and deploying reliable WiFi to support present and future IT initiatives can be a challenge.   Clinicians and staff are becoming dependent on mobile and connected...

Health Information Governance Strategies for Unstructured Data

HealthITAnalytics While electronic health records still have the potential to standardize care by enabling advanced analytics and informing clinical decision-making, much of the data held within these systems – and a large proportion of the data used in...

Exploring Two-Sided Financial Risk in Alternative Payment Models

RevCycleIntelligence As value-based care becomes the name of the game in healthcare, public and private payers are pushing providers to take on more financial accountability for their services through alternative payment models. In a fee-for-service world, providers...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks