EHR, Meaningful use, ICD-10, Electronic Health Records

Internal Auditing

Strong Health Data Security Starts with Employee Education

March 25, 2015 - As covered entities work to implement strong health data security measures, it is essential that they create a comprehensive education system for their employees. That is the approach that Mark Combs, assistant CIO for West Virginia United Health System, takes, and encourages other facilities to do so. In an interview with Combs explained that at his facility, they work...


IT security survey finds data location, monitoring concerns

A recent Ponemon Institute study, State of Data Centric Security, gauged how 1,587 Global IT and IT security practitioners across 16 countries view today’s threat landscape and what their biggest concerns are. While the findings mainly...

AHIMA Breach Management Toolkit: Small provider uses

Last week, reported on the recently-released American Health Information Management Association (AHIMA) Breach Management Toolkit. Since then, AHIMA was able to send the toolkit to the editorial staff...

AHIMA offers data breach toolkit to healthcare providers

Though the healthcare industry in general isn’t lacking in available online resources to aid data breach management, organizations may want to check out the American Health Information Management Association’s (AHIMA) recently published¬†Breach...

AHIMA issues privacy, security audit tips for providers

The American Health Information Management Association (AHIMA) recently published its “Privacy and Security Audits of Electronic Health Information” guide, which¬†laid out some healthcare security audit best practices. While maintaining...

Healthcare IT Security Director talks event, project focuses

Last week was busy for healthcare IT professionals and enterprise IT security personnel, as HIMSS14 was held February 24-28 in Orlando and the annual RSA Conference took place at the same time in San Francisco. For those of charge of healthcare...


Sign up for our free newsletter and stay up to date with tips and advice on:

Data Security
Cloud Security

Our privacy policy

no, thanks