Healthcare Information Security

Mobile News

How Apple-IBM deal may affect healthcare mobile security

by

It’s been a few weeks since Apple and IBM announced their new partnership, which made waves in a number of verticals, including healthcare. The argument could be made that the move prompted follow-up moves, such as Blackberry’s Secusmart...

Healthcare mobile security vendor arms race heats up

by

In acquiring former partner Secusmart, BlackBerry’s message was clear that, much like its competitors, it’s using security expertise acquisition as a platform to rejoin the enterprise mobile elite. Coming on the heels of last week’s...

Do third parties regularly access consumer health data?

by

Consumer-generated healthcare data privacy doesn’t appear to have caused too many ripples in the general public’s consciousness to this point. But a recent California Healthcare Foundation report looks at how personal health information...

Survey reviews IT security threats: Healthcare results

by

A recent IDG Connect and ForeScout survey, titled the State of IT Cyber Defense Maturity Report, reviewed the different security threats posed against finance, manufacturing, healthcare, retail and education organizations across the world. The...

Boston Children’s Hospital CISO talks secure messaging

by

Boston Children’s Hospital is among the latest hospitals to embrace, not attempt to block, clinical text messaging. As Paul Scheib, Children’s IT Director and Chief Information Security Officer (CISO), explained to HealthITSecurity.com how...

Apple HealthKit privacy questions for providers, developers

by

As referenced by Rocky Mountain Human Services (RMHS) IT Director Frank Baer, there is no turning back from the confluence of mHealth applications and healthcare privacy concerns. Instead, organizations must go head-first into mobile security....

Securing a healthcare mobile environment during EHR transition

by

As evidenced by all of the recent healthcare regulation news, our industry is in a state of evolution. While government, healthcare professionals and patients are the ones actually driving change, it is technology that is helping to power and...

mHealth Android app security review: Attack surfaces

by

A recent study by University of Illinois at Urbana-Champaign computer science student Dongjing He reviewed how some mHealth Android applications present privacy and security issues. In her “Security threats to Android apps” abstract,...

Ensuring HIPAA compliance among inpatient, outpatient docs

by

The continuum of care continues to expand and is forcing integrated delivery networks and health systems to reconsider their health data privacy and security practices after addressing the features unique to inpatient and outpatient clinical...

Mobile technology, user impact on hospital BYOD decisions

by

In addition to warmer New England weather, springtime represents a time where Chris Logan, Chief Information Security Officer (CISO) for Care New England Health of Providence, R.I., sees a brand new crop of residents come in wanting to use...

Healthcare BYOD: Choosing the right mobile security vendor

by

More and more employees are using their personal devices, such as smartphones and tablets, for work purposes, which is why BYOD has become a phenomenon. Keeping employees happy and productive with healthcare BYOD is great, but having a mobile...

Secure healthcare communication in a mobile environment

by

Mobile technology has undoubtedly advanced, as today’s smartphone possesses more computing power than NASA did when we first put man on the moon. Power without purpose, however, is chaos and privacy and security are not ancillary considerations...

Tailoring healthcare BYOD policy to bolster mobile security

by

With potential HIPAA audits looming in the distance, healthcare organizations are both ensuring they have the right technologies in place and are revising and updating their internal policies. For Ed Henry, Director of Technology at Princeton...

Seattle Children’s Hospital CISO discusses internal collaboration

by

The idea of having a strong security plan in place for a healthcare organization’s eventual data breach is one that has been discussed at length lately within the industry. But one of the key elements of a strong security plan is the internal...

Medical device hacks pose true threats to providers

by

Most healthcare IT professionals can attest to the fact that medical device management and security are significant roadblocks in building a security program. As the devices become more connected to networks and volume patching becomes more of...

Patient perspective on eHealth, mobile privacy and security

by

According to recently-released results from a Ponemon Institute and Experian Data Breach Resolution report, there are still eHealth services and mobile application privacy and security questions among consumers and patients. The report, titled...

Successful organizational health IT security strategies

by

Most healthcare IT security executives understand that no single solution will keep patient data secure and recognize that instead, a blend of the right technology, people and policy is the right approach. Peter Guerra, a principle in the Booz...

Managing healthcare network security and BYOD needs

by

Though there’s never a true winner in the “ease of use” v. security debate, coming to a happy medium between the two can present challenges for healthcare organizations. This is especially the case when dealing with the impact...

TigerText’s HIPAA guarantee: Provider, vendor ramifications

by

Most healthcare professionals will agree that there are more secure messaging options out there than they can count. With different vendors competing against each other for hospital and provider business with their own versions of mobile platforms...

Mobile health IT security: Bolstering technology with policy

by

One way or another, mobile devices are finding their way into healthcare organizations’ four walls and onto their networks. Each organization’s mobile needs vary based on size and available resources and many have come a long way...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks