EHR, Meaningful use, ICD-10, Electronic Health Records

Technical Safeguards

Health Data Breaches Stem From Cyber Attack, Exposed Binders

August 5, 2015 - Health data breaches can occur because of numerous reasons, which is why covered entities and their business associates must have comprehensive training measures and data security measures. All physical safeguards, technical safeguards and administrative safeguards need to properly align to give healthcare organizations the best chance at keeping PHI secure. S.D. clinic cyber attack affects...


Articles

McLean Hospital Reports Health Data Breach, Affects 12,600

Massachusetts-based McLean Hospital announced this week that it had suffered from a health data breach, potentially affecting 12,600 individuals. McLean discovered on May 29, 2015 that four unencrypted backup data tapes were missing, according...

Children’s National Health Data Breach Leads to Lawsuit

Children’s National Health System is facing a class-action lawsuit following a health data breach where 18,000 patients potentially had their information compromised. The incident took place toward the end of 2014, and occurred when Children’s...

How to Implement Strong HIPAA Technical Safeguards

Having strong HIPAA technical safeguards is essential for healthcare organizations of all sizes. However, it is also critical that those safeguards are not the only data security measure that covered entities rely on to keep data protected. Jeffrey...

A Review of Common HIPAA Technical Safeguards

HIPAA technical safeguards are just one piece of the larger health data security plan that covered entities and their business associates must put together. However, it is a very important aspect. Over the next few weeks, HealthITSecurity.com...

Software Update Causes PHI Exposure for Blue Shield of Calif.

Blue Shield of California is notifying patients that a recent software update led to potential PHI exposure. Faulty code on the company’s website for group health benefit plan administrators and brokers led to an unauthorized disclosure...

Why HIPAA Technical Safeguards Alone Are Not Enough

HIPAA technical safeguards are an important part of any covered entity or business associate’s data security plan. However, that security measure by itself is not enough to ensure that a health data breach will never occur, according to...

Healthcare Data Breaches Stem From Break-in, Phishing, Fraud

Preventing healthcare data breaches requires organizations to take numerous factors into account, and ensure that their administrative, physical, and technical safeguards are all working with one another. One lost document, one employee falling...

Phishing Scams: HIPAA Technical or Administrative Safeguard?

Phishing scams are not a new threat to the healthcare industry, but as other data security threats have evolved over time, so have phishing approaches. Early on, individuals might have gotten emails from someone claiming to be a prince from a...

Healthcare Authentication Factors: Breaking Down HIPAA

Strong technical safeguards are essential for covered entities, regardless of their size, and the right healthcare authentication factors are a critical aspect of those safeguards. Locking down end users, and maintaining technical safeguards...

How Healthcare Malware Attacks are Evolving

Healthcare malware attacks are evolving, which is why it is essential for facilities to keep current security measures. As the healthcare industry continues to adopt and implement new technologies, it is essential that facilities also keep their...

Cybersecurity is 2015 Top Health Technology Hazard

Cybersecurity is one of the top 10 health technology hazards for 2015, according to a recent ECRI Institute report. Cybersecurity should be a top priority for healthcare organizations, especially with more facilities implementing EHRs and connecting...

VA Cybersecurity Woes Continue, 16 Consecutive Audit Fails

The VA once again failed its annual cybersecurity audit. For the 16th consecutive year, the Department of Veterans Affairs failed its annual cybersecurity audit. The investigation sought to find out if the agency was in compliance with the Federal...

Creating Healthcare Security with Special Purpose Networks

With 69 percent of healthcare providers using mobile devices to view patient information, having a high-quality and secure, yet transparent wireless network within a healthcare organization (HCO) is indispensable. And, with the shift to outcomes-based...

Does Healthcare Security Interfere with Clinical Workflow?

Clinical workflows – an established process in a clinician’s daily activity of caring for patients – are increasingly integrating with healthcare information systems, and therefore, healthcare security.  The nation’s...

Why Healthcare Providers Should Consider Data Encryption

Healthcare Data Encryption is a crucial tool for providers as they implement BYOD policies and work to strengthen their EHR systems. Healthcare data encryption is becoming an increasingly hot topic, especially as more providers implement EHRs...

HIPAA Technical Safeguards: A Basic Review

It’s critical to review the requirements of HIPAA technical safeguards to ensure that your healthcare organization is compliant and able to keep PHI safe. While no healthcare organization can guarantee that a data breach will never take...

Potential Health Data Breach Hits Dermatology Facility

Central Dermatology Center is facing a possible health data breach after finding malware was uploaded into one of its computer servers. A North Carolina dermatology center is working through the aftermath of a potential health data breach after...

How Health Data Security Benefits from Industry Sharing

Health data security is not a new issue in the healthcare sector, but with health information exchanges (HIEs) springing up all over the country, facilities have to be aware of systems other than their own. In order to ensure that patient data...

Touchstone Medical Imaging Posts Data Breach Notification

Touchstone Medical Imaging, LLC has sent out notices to some patients treated prior to August of 2012 that it learned on May 9, 2014 that a shared folder holding sensitive data was exposed on the internet. The imaging specialist organization...

X

Sign up for our free HealthITSecurity.com newsletter and stay up to date with tips and advice on:

HIPAA
BYOD
Data Security
VDI
Cloud Security

Our privacy policy

no, thanks