Healthcare Information Security

Health Network Security

Best Practices for SQL Server Deployment in Healthcare

May 16, 2017 - I don’t want to spend too much time on a lengthy introduction; the topic around SQL server deployment and healthcare security is very important to cover. However, consider the fact that 2015 and 2016 were pretty awful years when it comes to data breaches in the healthcare world. A recent analysis pointed out that the largest healthcare data breaches of 2016 were nowhere near the scale...


More Articles

Best Practices for SQL Server Deployment in Healthcare

by Bill Kleyman

I don’t want to spend too much time on a lengthy introduction; the topic around SQL server deployment and healthcare security is very important to cover. However, consider the fact that 2015 and 2016 were pretty awful years when it comes...

Why Healthcare Network Security is a Critical Provider Tool

by Elizabeth Snell

Covered entities are quickly implementing more technology into daily operations, which could potentially open the door for cyber criminals or even unauthorized insider access. Healthcare network security measures must be current and comprehensive,...

NIST Vulnerable Software Guide May Affect Health Data Security

by Elizabeth Snell

A collection of strategies for reducing software vulnerabilities could potentially affect healthcare organizations that are looking to improve their health data security measures. National Institute of Standards and Technology (NIST) computer...

3 Tips for Creating Healthcare Security Change, Process Controls

by Bill Kleyman

Healthcare and security are probably some of the hottest topics today. We’re seeing medial IoT emerging, more digitizing of the healthcare ecosystem, and more healthcare services specifically using technology to revolutionize patient care....

Homeland Security Issues Ransomware Alert for Networked Systems

by Elizabeth Snell

The US Department of Homeland Security issued a ransomware alert through the US Computer Emergency Readiness Team (US-CERT) to organizations that use networked systems, warning them of the potential dangers stemming from this type of malware....

How to Successfully Integrate Secure Texting, Messaging

by Elizabeth Snell

Healthcare secure texting and secure messaging options are quickly increasing in popularity for covered entities. Providers are not only looking for secure, convenient ways to communicate internally, but externally as well. More patients have...

Why Medical Device Security is a Key 2016 Healthcare Issue

by Elizabeth Snell

Medical device security has quickly evolved into a top area of concern for covered entities. With more healthcare organizations connecting to HIEs, implementing BYOD strategies, and simply adopting more connected devices than before, it is critical...

What Does 2016 Hold for Healthcare Data Security, Storage?

by Bill Kleyman

Welcome to 2016! I’m sure all of you got some cool new gadgets or toys in your stockings. Maybe it was a new iPhone. Or, maybe you got a new Pebble Watch. Or - you just bought a new google-ready 70-inch LED TV. One thing pretty much...

Utah Dept. of Health Medicaid Data Security Risks Found

by Elizabeth Snell

The Utah Department of Health (DOH) was found to have certain Medicaid data security risks, according to a recent Office of Inspector General (OIG) report. Along with weaknesses found in a comprehensive information system general controls audit,...

Charles Stellar Named WEDI Interim President, CEO

by Elizabeth Snell

The Workgroup for Electronic Data Interchange (WEDI) announced earlier this week that Charles W. Stellar was named as the organization’s interim president and CEO. Devin Jopp, Ed.D. resigned earlier this month, but WEDI explained that Stellar...

Securing Healthcare Networks from Advancing Cyber Threats

by Bill Kleyman

The security threat matrix for the healthcare IT environment is evolving. Why? There are more users, a lot more data and new technologies that are capable of carrying information over vast, widely-distributed ecosystems. In fact, a recent Cisco...

3 Tips for Managing the Healthcare Security Threat Landscape

by Bill Kleyman

The healthcare IT, data center, and cloud landscape is changing. In fact, it’s already changed. Adversaries are no longer lone wolves, but have become a community that is trying new techniques, trades intellectual property, and sometimes...

How a Texas Org. Improved its Medical Device Security

by Elizabeth Snell

With more healthcare providers implementing connected devices, medical device security is becoming a more prominent aspect to data security plans. South Texas-based Methodist Healthcare Ministries (MHM) recently implemented SecurityCenter Continuous...

Why Medical Device Security Needs a Comprehensive Approach

by Elizabeth Snell

Medical device security is quickly becoming one of the top issues in the healthcare industry, especially as more healthcare providers implement connected devices. Organizations must ensure that everything from an X-ray machine to MRIs and even...

How Good is Your Healthcare Network Security Architecture?

by Bill Kleyman

We’ve often discussed health data security breaches here, as well as healthcare network security issues. In fact, with the digitization of the modern world, we’re seeing even more targets happen. Consider this: Juniper Research...

Report: Healthcare Security Incidents 3 Times More Likely

by Elizabeth Snell

It should come as no surprise that healthcare security incidents are becoming an increasingly common occurrence in the industry, especially with more providers connecting to HIEs and implementing EMRs. However, a recent survey shows that the...

Why Healthcare Network Security Must Be a Top Priority

by Rob Bathurst

Most healthcare organizations’ network infrastructures and support technologies are designed on the prevailing engineering principles of when the need for specific IT systems became a requirement for the organization. This can mean a variety...

KY Hospital Implements New Medical Device Security Option

by Elizabeth Snell

As more healthcare providers implement EMRs and connect to HIEs, medical device security increases in importance. More devices are connected to a network, and could potentially be vulnerable to malware or even unauthorized third-party access....

Creating Sensors, Enforcers for Healthcare Network Security

by Bill Kleyman

The first point to understand in this article on healthcare network security is that we are way beyond traditional networking conversations that revolve around simply passing traffic along properly. Modern networking environments are now highly...

Creating Health Data Security with a Next-Generation Network

by Bill Kleyman

A big part of working with today’s healthcare environment is designing a robust health data security solution. Of course, this involves securing the entire network as well. In many cases, administrators fear that too much security also...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks