Healthcare Information Security

Health IT Security and HIPAA News

Are More State Data Breach Notification Laws Recognizing PHI?

by

Federal regulations, such as HIPAA and the HITECH Rule, garner the majority of attention when it comes to the data breach notification process. However, state laws also exist, and tend to vary. Covered entities and business associates must ensure...

The Role of HIM Professionals in HIPAA Compliance

by

Individuals in the health information management (HIM) field play a critical role in covered entities’ approaches to data security, especially HIPAA compliance. HIM professionals are often “acquiring, analyzing, and protecting digital...

Healthcare Web Application Attacks Increase in Past Year

by

There has been a 14 percent increase in overall web application attacks from Q1 2016 to Q2 2016, while healthcare web application attacks have also increased in the past year, according to recent research from Akamai. DDoS attacks also increased...

Unauthorized HIE Access Leads to MA Data Security Incident

by

Massachusetts-based Codman Square Health Center is notifying patients that some of their information may have been exposed after a data security incident stemming from unauthorized HIE access. Codman was notified on July 13, 2016 that an employee...

How Expensive are Cybersecurity Attacks, Data Breaches?

by

While cybersecurity attacks and other data security incidents are on the rise, the actual costs of these types of scenarios are far less than previously reported, according to research from the Journal of Cybersecurity. Researchers examined over...

Healthcare Cybersecurity Task Force Seeks Industry Input

by

The recently appointed Healthcare Cybersecurity Task Force is hoping that a crowdsourcing approach will draw in the necessary advice and insight for how the group can best implement change to keep the healthcare industry secure against evolving...

Why Healthcare is a ‘Sitting Duck’ in Data Protection Measures

by

Healthcare organizations and manufacturers are very vulnerable when it comes to their data protection measures, according to the Intel Security 2016 Data Protection Benchmark Study.   While the gap between data loss and breach discovery...

Mobile Security Key Focus in Recent NIST Resources

by

The National Institute of Standards and Technology (NIST) recently released two draft resources that highlight current mobile security threats and then provide guidance on how public and private organizations can best approach those threats....

Geisinger Health Plan PHI Disclosure Affects 2,800

by

Geisinger Health Plan (GHP) recently announced that it experienced an unauthorized PHI disclosure affecting 2,814 members from 220 employers. GHP said it learned on August 4, 2016 that a processing error had taken for July 30, 2016 invoices....

Coordinating Healthcare Data Center Security, Cloud Security

by

The modern healthcare IT environment has quickly become the home of next-generation technologies. Still, the proliferation of cloud computing and the data-on-demand generation has created new types of challenges for today’s healthcare IT...

Secure Texting, App Security Top Mobile Health Topics

by

With more covered entities beginning to consider secure texting options or BYOD implementation, it makes sense that certain app security and mobile health security concerns also arise. However, the implementation process can be done securely,...

Cybersecurity Attack Affects MO Behavioral Health Facility

by

Missouri-based Burrell Behavioral Health recently announced that it was the victim of a cybersecurity attack after an employee’s email account was accessed by an unauthorized party. Burrell made the discovery on July 7, 2016 and immediately...

Utilizing Business Associate Agreements in Breach Prevention

by

While no healthcare organization can guarantee that they will never fall victim to a data breach or cybersecurity attack, having the right tools in place can help to lessen the likelihood or even assist in recovering from a breach. Having necessary...

How are Healthcare Data Breach Victims Affected by Attacks?

by

The large fiscal cost to individual victims stemming from medical identity theft is just one of the key ways that healthcare data breaches affect patients, according to a recent report from the Institute for Critical Infrastructure and Technology...

Information Sharing Key in Improving Healthcare Cybersecurity

by

Improving the outreach and information sharing on healthcare cybersecurity issues, along with having more educated and qualified cybersecurity personnel and health IT experts will be essential in strengthening the healthcare cybersecurity infrastructure,...

Necessary Skills for Healthcare IT Security Professionals

by

So you work in the healthcare IT security world. Have you seen some changes? Are you noticing more users requesting complex applications? Maybe you’re starting to deploy more compliance-ready cloud systems. Or, you could be utilizing new...

St. Jude Files Lawsuit Over Medical Device Security Claims

by

Claims over potential medical device security issues with St. Jude Medical, Inc. pacemakers and other heart devices has now led to a lawsuit. St. Jude filed a lawsuit in the United States District Court for the District of Minnesota against Muddy...

New Federal CISO Set to Bolster National Cybersecurity Measures

by

Brigadier General (retired) Gregory J. Touhill was announced as the first Federal CISO earlier this week, and is expected to continue the push toward stronger national cybersecurity measures. Touhill is currently the Deputy Assistant Secretary...

Vendor Error Leads to Another Possible Healthcare Data Breach

by

CHI Franciscan Health Highline Medical Center (Highline) is notifying certain patients that some of their information may have been exposed due to a vendor error. R-C Healthcare Management (R-C Healthcare) previously worked with Highline before...

Medical Device Cybersecurity Key Focus in NIST Partnership

by

A new risk assessment project designed for monitoring wireless IV medical infusion pumps hopes to further strengthen medical device cybersecurity across the healthcare industry. The National Institute of Standards and Technology’s (NIST)...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks