Healthcare Information Security

Health IT Security and HIPAA News

Mass. Launches Online Data Breach Notification Archive

by

As part of the recently updated Massachusetts Public Records Law, the state’s Office of Consumer Affairs and Business Regulation made its online Data Breach Notification Archive available to the public. Governor Charlie Baker signed the...

Patient Data Breach Fear Hinders Health Data Sharing

by

As technology continues to evolve in the healthcare industry, patients may not be as accepting of tools such as patient portals and mobile apps over a fear of a data breach. A recent Black Book survey found that 57 percent of consumers who had...

Cybersecurity Challenges Key Focus in Federal Appointment

by

Last week, Thomas P. Bossert was appointed to serve as Assistant to the President for Homeland Security and Counterterrorism, and will advise the President-elect on cybersecurity challenges, homeland security, and counterterrorism. The role has...

Easing HIPAA Violation Concerns with Patient Data Access

by

While the healthcare sector continues to work toward achieving nationwide interoperability, concerns over potential HIPAA violations with regard to patient data access is also on the rise. Covered entities need to allow individuals access to...

What Happened with mHealth Security, Mobile Privacy in 2016?

by

Covered entities and business associates are continuously searching for the technologies that can improve physician workflow, while also ensuring PHI security. Mobile devices are increasing in popularity, and are quickly becoming beneficial tools...

ICIT Finds Healthcare Sector at Great Risk for DDoS Attacks

by

With its high dependency on digital records, network connectivity, accessible information, and real-time communication, healthcare is one of the sectors at greatest risk for a DDoS attack, the Institute for Critical Infrastructure Technology...

What Should Entities Expect for Healthcare Security in 2017?

by

We can spend the entirety of this article discussing all of the breaches, security holes, and data loss that happened within healthcare this year alone. There are plenty of examples around encryption, physical device loss, lost user accounts,...

New Hampshire Hospital Data Breach Affects 15K Patients

by

A patient at New Hampshire Hospital reportedly hacked into the New Hampshire Department Of Health And Human Services (DHHS), posting information online and creating a potential data breach for 15,000 individuals. DHHS said in an online statement...

FDA Finalizes Medical Device Cybersecurity Guidance

by

An effective medical device cybersecurity risk management program needs to include premarket and postmarket lifecycle phases, according to recent guidance from the Food and Drug Administration (FDA). Furthermore, cybersecurity should be addressed...

Protecting Healthcare Physical Assets Containing PHI

by

Administrators are actively looking into more ways to protect their virtual machines, their data points, and all of those logical resources that the organization relies upon. As the healthcare entity becomes even more digitized, we must never...

Maintaining Data Security with Cloud Computing Options

by

Cloud computing is quickly becoming a popular option for healthcare organizations, including both covered entities and business associates. Offsite storage can aid data security measures, but the information can still be accessed from numerous...

ONC Explains Patient Data Access, HIPAA in Latest Report

by

While health IT has made progress on standards and economic incentives, concerns over HIPAA rules and patient data access can be a hindrance on the continued push toward nationwide interoperability, according to a recent report from the Office...

NIST Cybersecurity Guide Highlights Recovery, Restoration Plan

by

Properly developing and implementing recovery plans, processes, and procedures will help organizations fully restore a system weakened during a cybersecurity event, the National Institute of Standards and Technology (NIST) explained in a recent...

DirectTrust Voices Concern for Cybersecurity in Healthcare

by

The new administration needs to understand the importance of creating strong cybersecurity measures in healthcare, according to DirectTrust. Encryption, authentication, and identity management are all critical requirements to help policy and...

Data Encryption Workgroup Report Discusses Privacy Concerns

by

It is important to remember that there is not a “one-size-fits-all” answer or a “solution” to the debate over whether or not data encryption should be utilized by organizations or the government, the bipartisan Encryption...

Records Containing PHI Stolen from TX Orthaepedic Facility

by

On December 15th, Oak Cliff Orthopaedic Associates announced a theft involving records containing personal PHI from the years 2006 to 2007. According to a report from Oak Cliff, the Lewisville Police Department has since located and returned...

Secure Texting Rules Clarified in Joint Commission Newsletter

by

Using secure texting for patient care orders is still not acceptable, the Joint Commission explained in its December newsletter. While the Joint Commission had reinstated its ban on the mHealth platform earlier this year, it stated that some...

CHIME Notes Cybersecurity Challenge in MACRA Final Rule

by

More attention must be given to the current cybersecurity challenge and the persistent lack of interoperability across the nation’s health system must also be addressed in the final MACRA rule, according to the College of Healthcare Information...

Utilizing Risk Analyses for Comprehensive HIPAA Compliance

by

As technology continues to evolve and become more intricate, covered entities and their business associates have to ensure they account for potential risk in all aspects of their organization. A key part to complete HIPAA compliance is an updated...

Study Finds Human Factor Key Area of Cybersecurity Risk

by

A lack of cybersecurity staff members, a lack of employee training, and not enough boardroom prioritization are top contributions to cybersecurity risk, according to a recent study from the Information Systems Security Association (ISSA) and...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks