Healthcare Information Security

Cloud News

Deploying virtual security appliances in a healthcare setting

by

With the increase in security threats, breaches and malicious activities, healthcare organizations are trying harder than ever to secure their environments. This means placing devices inside and even outside of their networks. In some cases,...

Healthcare security considerations during cloud implementation

by

Many healthcare organizations are truly starting to embrace using cloud computing to store their electronic health records (EHRs) and now have a better understanding of the controls needed to properly manage patient data. But with the new HIPAA...

Fine-tuning your healthcare SaaS security approach

by

Though Software as a Service (SaaS) is often referred to as a generally solid option for healthcare organizations looking to use cloud computing, the SaaS privacy and security implications can be ambiguous at times. In a recent blog post, John...

HIMSS13 healthcare security vendor trends: Cloud and BYOD

by

Two important health IT security trends at HIMSS13 were mobile security and cloud security because of new technology and government rules and regulations such as HIPAA. Both rank fairly high on healthcare organizations’ priority lists and HealthITSecurity.com...

Facing the healthcare cloud security challenge head-on

by

There will be benefits and challenges with any technological innovation. This holds especially true for anything related cloud computing. We now have a multitude of different cloud model types where healthcare organizations can best use the available...

HIMSS13 Day One security takeaways

by

NEW ORLEANS — Day one at HIMSS13 was certainly a busy one and HealthITSecurity.com met with a variety of attendees to lead about new security technologies and endeavors in 2013. TigerText opened the TigerText platform today to developers...

Healthcare identity federation simplifies authentication

by

The ability to extend an environment into the cloud has become a hot conversation topic among many healthcare IT professionals. Cloud-based applications, portals and information points are all good reasons to somehow connect the user environment...

What will Texas Office 365 deal mean for healthcare security?

by

The Texas Department of Information Resources has officially bought into Microsoft Office 365 and with it the idea that it can maintain HIPAA compliance and avoid down time. Microsoft has entered into a HIPAA Business Associate Agreement (BAA)...

Creating strong healthcare cloud encryption keys

by

When encrypting healthcare cloud data, security officers need to reach a certain level of confidence with encryption keys and managing those keys. Since the data is no longer being housed on premise, there’s a strong reliance on managing patient...

New technologies make healthcare security pros more efficient

by

One of the underlying sayings in IT is “do more with less.” This certainly holds true for the healthcare industry. Over the past few years, administrators have been tasked with creating a more robust and efficient environment capable...

Healthcare CIO survey denotes infrastructure security burdens

by

An independent study – Digital Overload of Healthcare Information and Looming Deadlines Driving New Challenges for IT Executives – done by Level 3 Communications, Inc. delineated the infrastructure security thoughts and concerns of 100 healthcare...

Healthcare cloud authentication: Identity federation challenges

by

Each type of cloud computing delivery model – Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) – presents different types of challenges for healthcare organizations trying to protect...

Optimizing health data security with cloud, virtualization

by

New virtualization and cloud technologies are helping healthcare organizations shape their security, management, and data center environments. However, in creating a solid platform, administrators must look at the various virtualization technologies...

Multi-factor authentication options for healthcare IT managers

by

Evaluating authentication methods presents a unique set of challenges for healthcare organizations. Multi-factor authentication adoption is becoming more frequent because BYOD and cloud data storage are gaining prominence. Furthermore, it will...

Next-generation healthcare security: Cloud, BYOD and applications

by

The current healthcare security landscape has come far beyond the traditional firewall and security policies. Now, healthcare organizations are faced with new challenges in how to best secure their environment and still provide a good user experience....

Creating a secure, compliant healthcare file-sharing solution

by

Regulations and compliance metrics have always been a bit of a heavy weight on IT. The rapid pace of progress is mainly slowed by the bureaucracy trying to protect both the organization and the customer. This holds especially true for large healthcare...

HIMSS healthcare cloud security concerns: A review

by

It nearly goes without saying that how many healthcare CIOs, CISOs and IT managers approach healthcare cloud security in 2013 should be different than 2012. Though most healthcare data breaches have involved physical device theft, the fact remains...

Healthcare cloud security: CISO perspective

by

Many elements are at play when healthcare organizations decide whether they want start putting data into the cloud, whether it’s Software as a Service (SaaS), Infrastructure as a Service (IaaS) or Platform as a Service (PaaS). There’s the...

Healthcare cloud computing security needs for 2013

by

Forbes.com recently pulled together seven 2013 cloud computing predictions from various IT analysts and there were a couple of items that may prove to be extremely relevant to healthcare. Cloud computing in a healthcare setting is an interesting...

Health cloud-based database security concerns

by

The question of how best to handle big data as it becomes more comprehensive (and in turn, valuable) isn’t going away anytime Health IT professionals. And securing large quantities of patient data will prove to be even more complex and confusing....

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks