Healthcare Information Security

Mobile News

Despite security risks, BYOD helps nurses be more productive


It may be a huge HIPAA headache, but nurses who take advantage of BYOD policies report feeling more comfortable with their own devices and are more productive when it comes to their daily tasks.  Personal mobile devices help smooth a nurse’s...

FDA issues encryption, authentication rules for medical devices


The Food and Drug Administration (FDA) has issued new guidance on the radio frequencies of wireless medical devices, including recommendations for authentication and encryption measures to ensure the security of the device and the safety of the...

Is BYOD, mobile health security an all-or-nothing decision?


In healthcare, the debate over which mobile device strategy to support tends to be divided into two camps: those for and those against bring your own device (BYOD). While policies that give hospital staff the ability to use personal devices are...

Why are risk analyses key to health IT security management?


Risk analyses are vital to identifying privacy and security vulnerabilities resulting from the introduction of novel forms of health information technology (IT). And in an afternoon panel on privacy and security last week’s 2013 eHealth...

Making sense of BYOD policy trends for healthcare


A survey released by Acronis and the Ponemon Institute last week titled “2013 Data Protection Trends Research” analyzed the risks organizations across the country take in either having shoddy BYOD policies in place or, even worse, none at...

Weighing the privacy risks of mobile health and fitness apps


Privacy Rights Clearinghouse took a long look last week at the privacy and security risks associated with mobile health and fitness apps instead of the usual focus on medical applications. Despite being sometimes free and often beneficial to...

Choosing the right HIPAA-compliant SMS product


There are more than enough HIPAA-compliant short message service (SMS) options for healthcare organizations so mobile strategy often comes down to best fit for the organization. Whether it be price, maturity, scalability or other factors involved,...

Larry Ponemon on securing regulated data in healthcare: Q&A


Though mobile applications that share files through the cloud such as Box and DropBox can be appealing to consumers, the Ponemon Institute has found that these types of applications can be unsafe in a clinical environment. Ponemon released its...

mHealth patient privacy report reviews mobile security tips


The mHealth Alliance, the Thomson Reuters Foundation, Merck and Baker & McKenzie released the “Patient Privacy in a Mobile World” report yesterday that evaluated privacy and security policies from a global perspective. The group of organizations...

Malware threats to BYOD vary by platform, says mobile study


The rise of malicious attacks directed at mobile devices should give those charged with overseeing BYOD policies pause in light of the third annual mobile threats report released by Juniper Networks Mobile Threat Center (MTC). “The report...

mHealth security stakeholders to testify Thursday in D.C.


Three different mHealth industry stakeholders will stand before the House Committee on Small Business Subcommittee on Health and Technology on Thursday to argue that healthcare needs improved mobile medical application security. AirStrip CEO...

Securing different forms of internal clinical communication


Much like the need for interoperability among EHR systems, it would help a healthcare organization in the long run to have security products in place that are able to communicate with each other. For example, there are more short messaging service...

BYOD adoption requires security education, staff training


BYOD policies offer healthcare staff members the comfort and convenience of using their own devices. However, this comfort and convenience presents risks to health IT security as a result of how staff members use their own devices versus those...

FDA seeks comment on cybersecurity in medical devices


The increasing use of wireless, web-based, and networked medical devices and exchange of electronic information via these devices has led the Food and Drug Administration (FDA) to issue draft guidance in the form of the “Content of Premarket...

User cloud mobility creates new healthcare security options


One of the hottest topics between among healthcare IT managers is the BYOD management technology. After a few iterations of various solutions that have already hit the market – the mobile security management conversation has evolved from...

How does focusing on the data fit into healthcare security?


The phrase “focus on the data” is popular among IT directors and security personnel these days, but what exactly does that mean in the grand scheme of healthcare IT security? While this doesn’t entail de-emphasizing other aspects of security...

Healthcare BYOD, mobile cloud security restrictions


Most healthcare IT directors and security officers understand that at this point, mobile technology is an area they need to work with and not around while being aware of all the moving parts that go along with users’ mobile devices. Some of...

Addressing healthcare mobile security from a legal standpoint


When healthcare organizations’ IT and compliance staffs converge to implement a mobile platform for clinical staff users, technical and policy concerns are usually at the forefront of the decision-making process. But there’s also the...

Mobile healthcare application development security implications


As more EHR vendors create web-based and mobile interfaces for their products, the mobile market is further fragmented with applications that often weren’t meant for mobile. In response, many healthcare organizations are shunning the concept...

Healthcare BYOD security: Using new management technologies


There has been a shift in thinking when it comes to IT consumerization for many healthcare IT professionals. They are actually moving away from the BYOD trend and changing their focus toward something more up to date. The end user isn’t...


SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
Data Breaches

Our privacy policy

no, thanks