HIPAA, Patient Privacy, Healthcare Data Security BYOD

User Activity Monitoring

Internal healthcare security threats: Knowing what to look for

September 17, 2014 - BOSTON – Medical identity theft, fraud and negligence are prevalent healthcare data breaches these days because of the integration of financial data and these incidents aren’t going away any time soon, so it’s up to organizations to figure out who the insider threats are and how to reduce those risks. Regardless of whether it’s a relatively harmless (but careless) employee...


Articles

Memorial Hermann Health System suffers internal data breach

Memorial Hermann Health System reported an internal data breach in which an employee was able to gain unauthorized entry into the organization’s electronic health record (EHR) system over a 6 ½ year period, accessing 10,604 patients’...

Overseeing healthcare mergers from a security perspective

When much of a healthcare organization’s growth is derived from acquisition, there are undoubtedly a lot of moving parts. As the parent organization takes on new hospitals or practices, it must ensure that its IT and business strategies...

IT security survey finds data location, monitoring concerns

A recent Ponemon Institute study, State of Data Centric Security, gauged how 1,587 Global IT and IT security practitioners across 16 countries view today’s threat landscape and what their biggest concerns are. While the findings mainly...

West Virginia University Hospitals focus on IT security audits

When a healthcare organization makes decisions on security audit strategies, some key considerations are the potential impact on daily workflow and the amount of time that elapses between catching an abnormality and resolving the issue. Mark...

3 reasons why Fall is healthcare IT endpoint security time

Those who are on the front lines of healthcare IT security are up against a lot: data breaches, protecting EHRs, HIPAA compliance and more. But there’s one enemy some healthcare organizations may not have been totally prepared for: the dog...

Small health providers using audit logs for HIPAA compliance

One of the under-the-radar prongs of the HIPAA Omnibus Rule may be the portion that calls for healthcare organizations to invest time and resources into user activity monitoring. Section §164.308(a)(1)(ii)(D) of HIPAA mandates covered entities...

Changing healthcare privacy culture to reduce data breaches

One of the core issues for health data breach victims over the past few years has been the refrain that the incident was an anomaly and won’t happen again. Viewing a breach as a rogue incident would exacerbate the problem because, on a fundamental...

Centrally managing healthcare data security in a large system

NEW ORLEANS — Monitoring how healthcare data is moving and who’s accessing it is a crucial undertaking for Tony Hudock, Director of Development and Technical Operations at Dignity Health (formerly Catholic Healthcare West) because...

What threats will big data pose to health data security?

In November 2012 paper on the subject of big data security and privacy concerns, the Cloud Security Alliance laid out the top-ten challenges for the IT industry will face as more and more data are gathered in the cloud. Of these ten challenges,...

Healthcare CISOs need to focus on user activity monitoring

The Office for Civil Rights (OCR) completed its 2012 Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Audits back in June and found that healthcare providers consistently had issues with appropriate patient access...

X

Sign up for our free HealthITSecurity.com newsletter and stay up to date with tips and advice on:

HIPAA
BYOD
Data Security
VDI
Cloud Security

Our privacy policy

no, thanks