Healthcare Information Security

Mobile News

Managing healthcare network security and BYOD needs

by

Though there’s never a true winner in the “ease of use” v. security debate, coming to a happy medium between the two can present challenges for healthcare organizations. This is especially the case when dealing with the impact...

TigerText’s HIPAA guarantee: Provider, vendor ramifications

by

Most healthcare professionals will agree that there are more secure messaging options out there than they can count. With different vendors competing against each other for hospital and provider business with their own versions of mobile platforms...

Mobile health IT security: Bolstering technology with policy

by

One way or another, mobile devices are finding their way into healthcare organizations’ four walls and onto their networks. Each organization’s mobile needs vary based on size and available resources and many have come a long way...

Healthcare CIO perspective on BYOD, security vendor selection

by

In bringing new security technologies into a healthcare organization, from a CIO’s standpoint, there has to be the right mix of compatibility and alignment with internal policy. And in deciding which technologies and vendors would work...

UMC Health System Security Officer discusses user awareness

by

With 14 years under his belt working with government entities in IT security, Phil Alexander, Information Security Officer at University Medical Center (UMC) Health System, certainly has a unique outlook on IT security in the healthcare sector....

Involving nurses in mHealth strategy may boost security

by

When considering how clinical and innovation requirements fit into their mobile strategy, some organizations don’t consider nurses’ needs as well. Spyglass Consulting Group recently released “Point of Care Communications for...

Effective and secure internal communication key for hospitals

by

Those in charge of information technology within healthcare organizations can’t fall into the trap of concentrating on one area of need when it comes to security, which can prove to be difficult when specific incidents pop up. Instead,...

mHealth adoption creates data security challenges

by

The use of mobile devices within healthcare (mHealth) is rising as physicians, nurses, and other healthcare providers enjoy the portability and flexibility that mobile devices allow. Smart phones, tablets, and laptops provide easy access to health...

Mobile-thinking providers must scrutinize security options

by

A healthcare organization’s mobile security strategy involves many considerations, such as whether to allow BYOD or how much access the devices have to an organization’s network. But one shifting area of focus for enterprise security...

Human error tops Ponemon patient data security study threats

by

The Ponemon Institute’s fourth annual Patient Privacy & Data Security Study reviewed new and expanded threats of patient data security and privacy. Based on the results of the study, human error continues to be the biggest source of...

Survey: Data breach risk biggest concern for mHealth use

by

According to a recent Axway survey conducted during HIMSS14, data breaches are the biggest concern in mobile health (mHealth) technology for healthcare IT professionals. Axway is a provider of data flow management software, and its poll surveyed...

Using encryption at rest to enhance healthcare BYOD security

by

The confluence of mobile devices being widely distributed within healthcare organizations and data breaches involving unencrypted devices means there’s been plenty of discussion about mobile device encryption. Since most of these breaches...

HIMSS14: 10 healthcare data security challenges

by

This week many of us will head off to the HIMSS14 annual conference in Orlando. For some this will represent a break from this years harsh winter weather, for others a welcome break from the routine and a chance to see what’s new, and for others...

SANS survey analyzes health endpoint vulnerabilities

by

The recently-released 2014 SANS Securing the Internet of Things Survey collected healthcare organizations’ data between September 2012 and October 2013 and evaluated the effectiveness of cybersecurity strategies in combating industry vulnerabilities....

U.S. Senators: FDA healthcare regulation should be narrowed

by

There have been growing regulatory concerns in the healthcare industry because there’s a lack of clarity as to which government entities are in charge of different areas of compliance. To help ease some of this confusion, U.S. Senators...

Network security factors into healthcare wireless upgrades

by

Last week, Torrance Memorial Medical Center, a 401-bed, non-profit medical center in Los Angeles County, announced it was deploying an Aruba wireless local area network (LAN). Among the reasons for the update was to improve wireless infrastructure...

How will FDA regulations affect mHealth security efforts?

by

There has been a great deal of talk lately around which federal regulatory bodies have jurisdiction over keeping data private and secure in healthcare. While the battle between Federal Trade Commission (FTC) and LabMD mercifully ended last week,...

McAfee threat report cites mobile malware, social attacks

by

The McAfee Labs’ 2014 Threats Predictions report spanned a number of different areas of concern in IT security. Though, by nature, a company such as McAfee makes its business on ensuring the public knows the potential threats and how its...

Privacy must grow along with mHealth technology

by

The popularity of mHealth shouldn’t surprise anyone, as consumer habits have already begun to intertwine with enterprise technology needs. But as mHealth technology continues to develop, so will concentration on data privacy and security...

Cisco 2014 Annual Security Report identifies latest trends

by

The recently-released Cisco 2014 Annual Security Report offers a cross-industry look at the major security concerns at the moment as well as malware and vulnerability trends that will be significant in projecting healthcare IT security focuses...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks