HIPAA, Patient Privacy, Healthcare Data Security BYOD

Health IT Security

Hacking Still Leading Cause of 2015 Health Data Breaches

May 6, 2015 - Health data breaches are clearly not going away anytime soon, as 2015 has proven itself to consist of some of the largest breaches and hacking incidents on record. The Anthem data breach and Premera Blue Cross breach are the largest data breaches currently listed in the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) database, with approximately 90 million individuals...


Articles

How Health Privacy Regulations Hinder Telehealth Adoption

Health privacy regulations are one of the potential deterrents when it comes to telehealth adoption, according to a report by the American Hospital Association (AHA). Moreover, numerous legal and regulatory challenges can also make the process...

HRSA Data Security Controls Need Improvement, Says OIG

Data security controls at the Health Resources and Services Administration (HRSA) were not fully implemented and monitored, according to a recent report from the Office of the Inspector General (OIG). HRSA must improve its data security controls,...

ONC’s Lucia Savage Dissects Health IT Privacy, Security Guide

The Office of the National Coordinator (ONC) released the updated version of its health IT privacy and security guide last week, as a way to highlight “practical information that accurately reflects the guidance that is in the current regulations,”...

HIMSS15 Leaders Focus on Healthcare Privacy, HIPAA Rules

HIMSS15 took place this week in Chicago, and some of the highly discussed topics included healthcare privacy and security issues, such as HIPAA regulations. With more providers implementing EHRs, HIEs, and other forms of technology, ensuring...

ONC Proposes 2015 Health IT Certification Criteria Rules

The Office of the National Coordinator for Health Information Technology (ONC) announced its proposal for the 2015 Health IT Certification Criteria last week. The proposal coincided with the Centers for Medicare & Medicaid Services’ (CMS)...

AHA Wants Improved Health IT Policies, Interoperability

Better health IT policies, including national interoperability standards, are essential for the US healthcare industry as it continues to rely on health IT, according to the American Hospital Association (AHA). In a letter to the US Senate Committee...

Healthcare Data Security Not Major Priority For Hospitals

Finding ways to implement and use new technology is something that hospitals want to focus on in the upcoming year, but few facilities seem to have a focus on tools for healthcare data security needs, according to a recent survey. Market research...

Data Breach in Texas Compromises Personal Information

The personal information of 8,700 individuals, 6,300 of whom are patients, may be at risk following a data breach at Lone Star Circle of Care in Georgetown, Texas. According to a report from Mary Ann Roser on Statesman.com, the breach was discovered...

Enhanced Privacy Measures Part of HIMSS Letter to Congress

Enhanced privacy measures and healthcare security initiatives are part of the recommendations that the Healthcare Information and Management Systems Society (HIMSS) recently sent to Congress. It is essential for Congress to recognize how important...

Improving the Unhealthy State of Healthcare Data Security

Dominated by what seemed like an almost endless parade of data breaches, 2014 was a rough year for healthcare data security. Despite attacks against retail, media and financial institutions commanding headlines, the healthcare sector was hit...

HITRUST Creates Group to Improve Health Information Security

As cyber attacks and malware invasions continue to strike healthcare facilities, the security of healthcare IT data is a top priority for the healthcare sector. In response, The Health Information Trust Alliance (HITRUST) established a group...

Why Secure Healthcare Technology Must Assist Daily Workflow

Facilities are working hard to keep pace with federal regulations for secure healthcare technology. It is not enough to simply install an EHR, but healthcare organizations need to prove that they are using it properly and in a way that keeps...

EHR Security Issues Not Top Barrier for Pediatricians

The majority of pediatricians do not cite EHR security issues as a main barrier to implementation. Ensuring EHR security should be a top priority for healthcare organizations of all sizes. As more technological options become available, and as...

Why Healthcare Cybersecurity Measures Must Evolve

Without current healthcare cybersecurity measures, facilities could be vulnerable to online attacks. As technology continues to evolve, so must healthcare cybersecurity measures. Some of the latest online threats are considered Advanced Persistent...

Potential Healthcare Data Breach for 485K USPS Workers

The USPS announced that a healthcare data breach possibly compromised the information of 485,000 current and former employees. The United States Postal Service (USPS) first reported a cybersecurity breach in November that potentially compromised...

Is Healthcare Data Collection Legal?

What type of healthcare data can states collect? The Supreme Court could soon decide. Healthcare data collection programs in 16 states could soon be affected by a US Supreme Court decision. Last week, Supreme Court justices announced that they...

Can Smart Cards Reduce the Risk of Medical Identity Theft?

WEDI wrote a white paper on how smart cards could potentially reduce the risk of medical identity theft. Medical identity theft is increasingly becoming a top concern in the healthcare industry, especially as protected health information (PHI)...

Key Checklists for Patient Data Security

Michael Archuleta presented a HealthITSecurity webcast on maintaining patient data security. Last week, Mt. San Rafael Hospital Director of IT and HIPAA Security Officer Michael Archuleta presented a webcast on the importance of patient data...

Why Healthcare IT Security Must Account for Patient Portals

Organizations cannot ease up on their healthcare IT security measures, especially when it comes to patient portals. This is a way for individuals to gain access to their protected health information (PHI) and even securely communicate with their...

X

Sign up for our free HealthITSecurity.com newsletter and stay up to date with tips and advice on:

HIPAA
BYOD
Data Security
VDI
Cloud Security

Our privacy policy

no, thanks