Healthcare Information Security

Cloud News

How to Create Efficient, Compliant Healthcare Virtualization

by

Working with the modern virtualization has become a normal daily activity for most healthcare organizations. However, a compliant healthcare virtualization environment is critical. This virtual ecosystem houses the virtual machines that help...

Why Healthcare Cloud Management is a Top Industry Concern

by

The healthcare sphere is increasingly a data-driven and interconnected system of information sharing ranging from patient electronic health records to cost and value metrics, clinical trial sets, readmission rates and even genomic sequencing....

Healthcare Cloud Security Concerns Not Impediment to Usage

by

Public and private cloud solutions are gaining popularity in the healthcare industry, especially for data storage and network usage, despite issues surrounding healthcare cloud security and PHI data breaches. Researchers at HyTrust recently published...

Cloud Computing Security Vendors for Healthcare

by

Data security is critical for any healthcare organization, and as technology continues to evolve, more entities are beginning to look to cloud computing security options. However, in a highly regulated industry, organizations cannot choose a...

How DDoS Attack Increase May Affect Healthcare Cybersecurity

by

More organizations experienced multiple distributed denial of service (DDoS) attacks in the fourth quarter of 2015, which could spell out trouble for healthcare cybersecurity measures, especially for cloud-based services. According to Akamai’s...

Healthcare Ransomware, Connected Devices Top Security Issues

by

While the increase in connected devices and more options for Internet of Things (IoT) create massive streams of data and options for productivity, they also create more openings for security threats, according to a recent study. Furthermore,...

Providers Seek Cloud Solutions for Healthcare Data Security

by

While cloud solutions are advancing HIE and patient engagement strategies, more providers are focusing on how cloud services can be integrated into types of healthcare data security policies. According to a survey by Level 3 Communications Inc....

What are the 3 Key Layers in Healthcare Data Security?

by

The healthcare industry used to be on the sidelines of the cyber war, with breaches and malicious attacks far more common elsewhere. That has all changed. Five of the eight largest healthcare security breaches over the last five years—those...

Maintaining Healthcare Security Compliance in the Cloud

by

The evolution of the cloud has seen many healthcare organizations evolve from private, to public, and now to hybrid cloud platforms. In reality, almost every cloud environment within a public cloud has some sort of connection back to the central...

Does HIPAA Compliance Give A False Sense of Security?

by

The fact that HIPAA compliance isn’t bulletproof – that cybersecurity frameworks around health information require a new level of vigilance – is now axiomatic. Perhaps owing to whatever legislative sausage-making gave birth...

Optimizing Healthcare Cloud Security, Virtualization

by

Having strong healthcare cloud security is essential in the current industry. Today’s healthcare data center is highly virtualized, and even cloud integrated in some cases. Users are now a lot more mobile and are utilizing new types of...

What Are Top Healthcare Cloud Security Concerns?

by

Healthcare cloud security should be an issue that covered entities of all sizes understand. While the cloud might not be a tool that all organizations are considering implementing in the immediate future, it is still an increasingly popular option....

Healthcare Cloud Application Usage Increases in 2015

by

Recent research studies from Dell further show the need for better healthcare cloud security, as more organizations are adopting healthcare cloud applications.   For example, healthcare cloud application usage made a significant jump...

PHI Healthcare Cloud Security Still Too Low, Report Shows

by

The healthcare industry has vastly more PHI related policy violations when it comes to cloud security, according to Blue Coat Elastica Cloud Threat Labs Q4 2015 Shadow Data Report. Although the healthcare industry clearly has the most PHI...

More DDoS Attacks Show Need for Healthcare Data Security

by

Distributed denial of services (DDoS) attacks are up during the third quarter of 2015, reinforcing the healthcare industry’s growing concern for healthcare data security. According to an assessment performed by Akamai, all industries concerned...

Healthcare Cloud Adoption Slow Due to HIPAA, Survey Finds

by

While healthcare has increased its cloud adoption from 8 percent to 37 percent in the last year, according to a recent survey, it lags behind other industries in terms of cloud adoption due to HIPAA regulations. Privacy concerns, limited applicability...

NIST Calls for Public Comment on Cybersecurity Framework

by

The National Institute for Standards and Technology (NIST) is seeking public comments on its Framework for Improving Critical Infrastructure Cybersecurity, which was released in February of 2014. According to a NIST press release, the organization...

Excessive PHI Sharing Top Healthcare Cloud Security Concern

by

Excessive PHI sharing is the top concern for healthcare entities when it comes to cloud security, according to CloudLock’s Q4 2015 Cybersecurity Report. In a study that investigated a total of eight IT security industries and numerous case...

How Evolving Business Models Impact Healthcare Security

by

Let’s be honest for a minute here. Yes, healthcare is here to help people, improve lives, and provide the best care possible. However, healthcare is also a business. As much as we are here to provide the best kinds of healthcare services,...

3 Ways to Break Through the Healthcare Cloud Security Fear

by

It goes without saying that the road to healthcare cloud security has been a bumpy one for many organizations. Understanding what to push into a cloud ecosystem, how to control these workloads, and – most of all – how to secure the...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks