HealthITSecurity.com > Health IT Security

Health IT Security

In this 1 hour webcast IT professionals at two local hospitals talk about how they’ve used encryption solutions to help provide a “safe more »

Knowing who has access to patient data as well as being aware of the viable security threats out there may sound like more »

With potential HIPAA audits looming in the distance, healthcare organizations are both ensuring they have the right technologies in place and are more »

The idea of having a strong security plan in place for a healthcare organization’s eventual data breach is one that has been more »

For healthcare IT security personnel, some projects mirror what other organizations have done, such as implementing virtual desktop infrastructure (VDI) and eliminating more »

From a security technology perspective, smaller healthcare organizations don’t have to be inhibited by size and, instead, can use a progressive outlook more »

Connie Sadler, Information Security Officer for the University Medical Center of Southern Nevada, is beginning to plan out her organization’s security plans more »

Northwestern Memorial Hospital will be upgrading some of its technology infrastructure over the next year or so and Ross Dworman, Information Security more »

Sometimes, you have to provide those who are unsure about the realities of cloud computing with a reality check. Bruce Forman, Chief more »

Bruce Forman, Chief Information Security Officer (CISO) of UMass Memorial Medical Center, has been tasked with securing patient data at the second-largest more »

The 2013 “Most Wired” survey by Hospitals & Health Networks shows that healthcare organizations are doing their best to keep patient data more »

Virtual desktop infrastructure (VDI) has matured and has finally found its place within IT over the past few years. Is it the more »

Between hearing complaints from clinical staff about log-in times and worrying about the myriad patch updates for physical PCs, it’s no wonder more »

Protecting portable devices has quickly risen to the top of healthcare CIOs’ priority lists, but forming a protection plan that’s technologically and more »

Berkshire Health Systems, McAfee and DynTek hosted a Webcast yesterday titled “Three Defensive Moves for Data Security and Management in Healthcare.” With more »

A recent Washington Post report on healthcare cyber security indicates that not only do healthcare organizations still appear to unwilling to take more »

New Jersey’s Atlantic Health System announced recently that it was ranked No. 4 among 81 hospitals in Security Magazine’s annual survey of more »

There are numerous projects around desktop optimization happening today in the healthcare community. Many organizations are looking to refresh hardware and regain more »

Verizon Enterprise Solutions released its top business-tech trends for 2013 and No. 5 on the list was IT security, which healthcare organizations more »

According to the Salt Lake Tribune, in response to the mass data breach of around 780,000 Medicaid patients Utah Senator Stuart Reid more »

Though Cybersecurity Act of 2012 will likely die before it affects healthcare organizations, Senate Majority Leader Harry Reid, D-Nev, is making one last more »

An important part of healthcare providers remaining HIPAA-compliant is how they handle their policies and procedures. According to CEO and founder of more »

BOSTON – When asked about healthcare IT security risk management at yesterday’s Imprivata HealthCon12 conference, Good Samaritan Hospital CIO Chuck Christian said more »

In the healthcare sector, mobile applications and secure short message service (SMS) are becoming more popular because they are a much faster, more »

Healthcare providers should understand how each encryption layer works so they can choose the best fit for their patients’ ePHI. Encryption is more »

12»

no, thanks

Sign up for our free HealthITSecurity.com newsletter and stay up to date with tips and advice on:

  • HIPAA
  • BYOD
  • Data Security
  • VDI
  • Cloud Security

Our privacy policy