HIPAA, Patient Privacy, Healthcare Data Security BYOD
User Activity Monitoring

User Activity Monitoring

BOSTON – Medical identity theft, fraud and negligence are prevalent healthcare data breaches these days because of the integration of financial data and these incidents more »

Memorial Hermann Health System reported an internal data breach in which an employee was able to gain unauthorized entry into the organization’s electronic health record more »

When much of a healthcare organization’s growth is derived from acquisition, there are undoubtedly a lot of moving parts. As the parent organization takes on more »

A recent Ponemon Institute study, State of Data Centric Security, gauged how 1,587 Global IT and IT security practitioners across 16 countries view today’s threat more »

When a healthcare organization makes decisions on security audit strategies, some key considerations are the potential impact on daily workflow and the amount of time more »

Those who are on the front lines of healthcare IT security are up against a lot: data breaches, protecting EHRs, HIPAA compliance and more. But more »

One of the under-the-radar prongs of the HIPAA Omnibus Rule may be the portion that calls for healthcare organizations to invest time and resources into more »

One of the core issues for health data breach victims over the past few years has been the refrain that the incident was an anomaly more »

NEW ORLEANS — Monitoring how healthcare data is moving and who’s accessing it is a crucial undertaking for Tony Hudock, Director of Development and Technical more »

In November 2012 paper on the subject of big data security and privacy concerns, the Cloud Security Alliance laid out the top-ten challenges for the more »

The Office for Civil Rights (OCR) completed its 2012 Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Audits back in June and found more »

  • Featured Resource


Sign up for our free HealthITSecurity.com newsletter and stay up to date with tips and advice on:

  • BYOD
  • Data Security
  • VDI
  • Cloud Security

no, thanks

Our privacy policy