Healthcare Information Security

Mobile News

McAfee threat report cites mobile malware, social attacks

by

The McAfee Labs’ 2014 Threats Predictions report spanned a number of different areas of concern in IT security. Though, by nature, a company such as McAfee makes its business on ensuring the public knows the potential threats and how its...

Privacy must grow along with mHealth technology

by

The popularity of mHealth shouldn’t surprise anyone, as consumer habits have already begun to intertwine with enterprise technology needs. But as mHealth technology continues to develop, so will concentration on data privacy and security...

Cisco 2014 Annual Security Report identifies latest trends

by

The recently-released Cisco 2014 Annual Security Report offers a cross-industry look at the major security concerns at the moment as well as malware and vulnerability trends that will be significant in projecting healthcare IT security focuses...

VMware buys mobile security vendor AirWatch for $1.54 billion

by

In a buyout that may affect the healthcare industry from a mobile security standpoint, VMware announced today that it has agreed to acquire mobile security company AirWatch for $1.54 billion. The deal will be part of the VMware, which is among...

Looking at both sides of the BYOD remote wipe policy debate

by

Many healthcare organizations that have BYOD policies and procedures in place to ensure the device and, more importantly, the data on the device are secure. And as part of those policies, organizations will stipulate that can remote wipe the...

Healthcare privacy, security 2014 predictions: Future trends

by

A hectic 2013 has certainly set the stage for a busy 2014 packed with healthcare organizational policy changes and technology advancements. Based on healthcare expert feedback and interviews in 2013, HealthITSecurity.com has come up with five...

Top five health IT security technology trends of 2013

by

There was a great deal of technology adoption among healthcare organizations in 2013 with the intent of improving security. Some organizations wanted to ensure they were HIPAA compliant. Others were already HIPAA compliant but wanted to make...

How an accountable care CIO handles mHealth security

by

Because accountable care organizations (ACOs) have such diverse members with different priorities, keeping track of the different types of patient data flowing in a secure way can be demanding. As Tom Samuels, CIO at Quality Independent Physicians...

Healthcare CISO prioritizes virtual desktop infrastructure

by

Connie Sadler, Information Security Officer for the University Medical Center of Southern Nevada, is beginning to plan out her organization’s security plans for 2014 and virtual desktop technology will play a large part in those efforts....

FTC spring webinar to focus on patient mobile app security

by

The Federal Trade Commission (FTC) will host a series of seminars this spring based on different areas of technology, including healthcare, that have strong benefits but privacy and security concerns continue to be problematic. The FTC recently...

mHealth privacy, security: More questions than answers

by

Accessibility to data through various mHealth applications creates some clear benefits for patients and providers – better accessibility and transparency, for example. But wading through the myriad mHealth privacy, confidentiality and security...

Top EHR security myths: Encryption and BYOD

by

Like any other industry, healthcare has a great deal of misinformation floating around security best practices. This is especially the case when it comes to securing a healthcare organization’s EHR data. Review the different misnomers that...

Addressing BYOD security at a large medical research center

by

Creating a BYOD program that is secure and sensible for all involved in a healthcare organization is difficult enough when the majority of users have similar responsibilities. But when trying to work through the technical details and policy barriers...

Mapping out a health IT director’s security responsibilities

by

Healthcare CIOs and IT Directors are well-known to “wear many hats” and must balance their various responsibilities, but how much weight should they place on each duty one on a day-to-day basis? For these C-level executives with limited...

Top healthcare CISO concerns: Finding the data, BYOD risks

by

As information security officer at UCSF Medical Center in San Francisco, Rob Winter has many concerns that are top of mind. “With the data security threat landscape constantly changing,” Winter said, “this has varied over the...

Healthcare BYOD security considerations and concerns

by

Hackers know that healthcare C-level executives have a lot to think about with mobile security and BYOD policies, including the volume of data flowing in and out of an organization, general absence of security controls and mixing of corporate...

Reconciling mobile security flaws with health BYOD strategy

by

A healthcare CISO must always be vigilant for the latest software threats and, nearly as importantly, know how to weed out high-risk security defects from always-present minor flaws. Mobile security is high on CISOs’ priority lists these...

FDA rolls out new mobile medical application enforcement

by

The U.S. Food and Drug Administration (FDA) issued final rules governing mobile medical application development on Monday, which may end up affecting how healthcare organizations use and secure mobile data down the road. The FDA said it plans...

Plugging in health IT infrastructure security gaps

by

BOSTON - When a healthcare organization sustains a malicious attack, it needs to continually understand how the hackers were able to get inside the system so it can better prioritize its cybersecurity efforts going forward. That seems fairly...

How EHR system gaps impact pediatricians, patient privacy

by

Ensuring that an EHR system properly safeguards adult patient information is made easier by the fact that the vast majority EHR vendors and products are tailored to these kinds of patients. The same cannot be said of specialists such as pediatricians...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks