Healthcare Information Security

Health IT Security and HIPAA News

How HIPAA Regulations Allow for Patient Data Access

by

Patients being able to access their own information is an essential right under HIPAA regulations, according to the American Health Information Management Association (AHIMA). However, patient data access is often misunderstood, and individuals...

How Healthcare Benefits from Cybersecurity Guidelines

by

Healthcare entities have several key cybersecurity frameworks to utilize when it comes to implementing necessary cybersecurity guidelines. However, not all organizations necessarily have access to the same type of guidance. Nearly half –...

Risk-Based Cybersecurity Approach Key in HHS IT Strategic Plan

by

Improving cybersecurity measures with a risk-based approach is a key component of the Department of Health and Human Services’ (HHS) recently released Information Technology Strategic Plan FY 2017-2020. The plan is part of an HHS collaborative...

CHIME Calls for HHS to Prioritize Healthcare Cybersecurity

by

Improving healthcare cybersecurity must be a top priority for the Department of Health and Human Services (HHS), the College of Healthcare Information Management Executives (CHIME) explained in a recent letter to the new HHS Secretary. HHS should...

Recent Cybersecurity Bill Focuses on State, Local Preparation

by

A reintroduced cybersecurity bill hopes to help state and local governments fight against the increasing number of cybersecurity threats. The State and Local Cyber Protection Act will require more coordination with the Department of...

Preparing for Increasing Healthcare Cybersecurity Risks

by

The more connected that covered entities and business associates become, such as through the use of IoT devices and BYOD strategies, they must ensure that potential healthcare cybersecurity risks remain a top consideration.   Failing to...

Physicians Charged with Healthcare Fraud, Identity Theft in PR

by

A District of Puerto Rico Federal Grand Jury charged the owner of a durable medical equipment company and three physicians with multiple counts of conspiracy to commit healthcare fraud, healthcare fraud and aggravated identity theft.  The...

Maintaining Patient Data Privacy, Security in Data Sharing

by

Being able to efficiently share patient information can help providers in numerous ways, including avoiding readmissions, avoiding medication errors, and even in decreasing duplicate testing. With even more interoperability tools at the ready,...

79K Patients Affected by Emory Healthcare Data Breach

by

Nearly 80,000 patients were potentially impacted by a recent data breach at Georgia-based Emory Healthcare’s Orthopaedics & Spine Center and Brain Health Center (EHC) at Emory Clinic. On January 3, 2017, EHC became aware of an incident...

HHS Information Security Programs Better, Can Still Improve

by

The Department of Health and Human Services has made improvements to its information security programs, including in its compliance with the Federal Information Security Modernization Act of 2014 (FISMA), but there are still areas that can become...

HITRUST CSF Roadmap Focuses on Small Healthcare Orgs, NIST CSF

by

HITRUST announced enhancements to its cybersecurity framework, which will assist smaller healthcare organizations create stronger risk management programs, cybersecurity measures, and help them achieve NIST Cybersecurity Framework (NIST CSF)...

Why Data Security is Critical with Healthcare Blockchain

by

Healthcare organizations are utilizing more electronic data than ever before, and many are working toward interoperability and connecting to HIEs. Data security measures cannot be an afterthought, and must be a top priority as covered entities...

How Effective is Secure Messaging in Healthcare Communication?

by

Healthcare communication is ever-evolving, as more organizations continue to implement BYOD options and secure messaging or secure texting platforms. Providers want to have effective ways to communicate that do not compromise patient information....

Securing Endpoint Devices from Healthcare Ransomware Threats

by

More healthcare organizations are implementing mobile devices and opting for BYOD strategies to help strengthen communication capabilities. However, the increase in endpoint devices has also opened entities up to more security issues, such as...

OCR Calls for Healthcare Cybersecurity Collaboration

by

The government, private sector, and international network defense communities all need to work toward stronger collaboration and information sharing to combat the increasing amount of healthcare cybersecurity threats, the Office for Civil Rights...

Appeals Court Dismisses VA Data Breach Lawsuit

by

The US Court of Appeals, Fourth Circuit, dismissed a data breach lawsuit earlier this month that alleged the William Jennings Bryan Dorn Veterans Affairs Medical Center (Dorn VAMC) had violated the Privacy Act of 1974 and the Administrative Procedure...

Rehabilitation Facility Reports Patient Data Files Unattended

by

Catalina Post-Acute and Rehabilitation recently became aware of an incident where paper files containing resident and employee information were left in an unattended area. The patient data files, along with certain employee information, were...

Healthcare Apps Privacy, Security Top Provider Concern

by

Healthcare providers stated that their top concern with third party healthcare apps was their privacy and security capabilities, according to a recent Substitutable Medical Applications, Reusable Technology (SMART) Health IT study. Just under...

Why Healthcare Cybersecurity is a Risk Management Issue

by

Healthcare organizations are slowly working to increase their healthcare cybersecurity governance, staffing, and budgetary resources, but there is still room for improvement, according to a recent study. The second annual HIMSS Analytics HIT...

Healthcare Cybersecurity Increasingly Key Issue in C-Suite

by

Healthcare providers are continuing to prioritize cybersecurity concerns, according to a recent KLAS Research and College of Healthcare Information Management Executives (CHIME) study. In efforts to ensure stronger data security measures, more...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks