Healthcare Information Security

Cybersecurity News

Are Stolen Medical Records Still Worth More Than Financial Data?

by

Healthcare data breaches can be harmful to not only the organizations that experience an incident, but also to patients who may have had their information inappropriately accessed. However, a recent report shows that stolen medical records are...

OCR Newsletter Underlines Healthcare Authentication Importance

by

One of the causes of healthcare data breaches over the past few years has been to weakened healthcare authentication measures, according to the Office for Civil Rights (OCR). As healthcare continues to be a top target for cyber attacks, organizations...

EHNAC, HITRUST Eliminate Health Data Security Redundancies

by

In an effort to help healthcare organizations cut down on certain health data security and privacy redundancies, two accreditation and certification organizations recently decided to work together on reducing costs and streamlining the processes...

NIST Resource to Help Create Strong Cybersecurity Workforce

by

An organization led by the National Institute of Standards and Technology (NIST) developed a new resource to ensure that organizations can “more effectively identify, recruit, develop and maintain its cybersecurity talent” and create...

HIMSS Praises DHS National Cybersecurity Response Plan

by

Understanding the dimensions of potential cyber threats and providing better clarification on what equates a significant cyber incident are two suggestions the Healthcare Information Management Systems Society (HIMSS) provided to the Department...

Study Finds Cyberthreat Data Overwhelming to Security Workers

by

While more organizations are likely looking for the best options to combat evolving cybersecurity threats, a recent study found that the majority of security professionals are overwhelmed by the amount of cyberthreat data that they receive. An...

FTC Releases Data Breach Response Guidance for Businesses

by

The Federal Trade Commission (FTC) outlines the steps that businesses should take if they suspect that they have fallen victim to a data breach in a recently released data breach response guide and accompanying video. Along with securing physical...

3 Tips for Creating Healthcare Security Change, Process Controls

by

Healthcare and security are probably some of the hottest topics today. We’re seeing medial IoT emerging, more digitizing of the healthcare ecosystem, and more healthcare services specifically using technology to revolutionize patient care....

Health IT Leaders Cite Data Theft As Key Cybersecurity Concern

by

Social engineering attacks and data theft are the main cybersecurity concerns when it comes to health IT, according to a recent survey of healthcare chief information and chief information security officers. The College of Healthcare Information...

HIMSS Urges Holistic Security to Combat Cybersecurity Threats

by

As healthcare cybersecurity threats continue to evolve, covered entities must ensure that they are also adapting their approaches to data security measures, according to a recent position statement from the Healthcare Information Management Systems...

How Can Covered Entities Best Prepare for Ransomware Threats?

by

Please don’t turn a blind eye to ransomware threats, or think “it won’t happen to me.” Because it can, and it very well may. Today, healthcare has already become a digital entity with more digital assets and very sensitive...

Many Healthcare Ransomware Attacks Impact Providers, Patients

by

When a covered entity is impacted by a healthcare ransomware attack, the recovery process is not always easy. Not only will daily operations likely be impacted, but patients could also feel the effects. Whether the ransomware caused patient records...

Improving Health Data Security with Payment Security Controls

by

Healthcare data encryption options are often touted as key ways for covered entities and business associates to strengthen their health data security. That includes payment security controls, which should be considered as part of a provider’s...

Top 4 Healthcare Data Breaches Stem from Hacking Incident

by

While 2016 is not yet complete, there have already been approximately 250 reported cases of potential healthcare data breaches affecting more than 500 individuals submitted to the Office for Civil Rights (OCR). The majority of these incidents...

What is the Full Impact of a Healthcare Cybersecurity Attack?

by

Large-scale healthcare data breaches are not new to the healthcare industry, and healthcare cybersecurity attacks are becoming more intricate and difficult to predict. However, the initial attack is not always where the story ends for covered...

How User Training Affects Healthcare Ransomware Preparation

by

Covered entities and business associates have numerous areas to consider when it comes to preparing against potential healthcare ransomware threats. It is not enough to just install firewalls and anti-virus software. Organizations need to implement...

EHNAC, HITRUST Combine HIPAA Security Criteria, CSF Framework

by

The Electronic Healthcare Network Accreditation Commission (EHNAC) and the Health Information Trust Alliance (HITRUST) are collaborating to streamline their accreditation and certification programs. EHNAC will replace its HIPAA-related privacy...

Using Layered Security for Evolving Cybersecurity Threats

by

The healthcare industry possesses large amounts of sensitive information, yet is consistently vulnerable to the evolving cybersecurity threats. Refusing to adapt to the changing threat landscape, and work to implement a layered security approach...

Attorneys Find Healthcare Cybersecurity Threats Increasing

by

The majority of corporate healthcare attorneys have found that healthcare cybersecurity threats are increasing, and that they are being called upon more often to evaluate whether a security incident implicates reporting obligations. A survey...

Information Security Weaknesses in MN Health Insurance Exchange

by

Minnesota recently implemented security controls across its health insurance exchange (MNsure), but there are still information security weaknesses that could affect PII security, according to the Office of Inspector General (OIG). Improvements...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks