Healthcare Information Security
  • How Do HIPAA Regulations Apply to Wearable Devices?

    March 23, 2017 - Both covered entities and business associates should be well-aware of the OCR HIPAA audit program, especially as Phase 2 has been underway for several months now. However, as technology continues to evolve, there are also several areas that could bring confusion to healthcare organizations. More organizations are opting for cloud computing options, and may even start to implement wearable...

  • 3 Critical Steps for Managing Third-Party Access to Your EHR

    March 22, 2017 - Before a hospital grants any kind of network access to users from an outside organization, like a physician’s practice, it must determine to whom access is granted and for how long. It is a complex and essential process. This article will outline three critical steps hospital executives should take in order to effectively manage third-party access and mitigate risk of breach at their...

  • How Automation, Orchestration Impact Healthcare IT Security

    March 16, 2017 - The modern healthcare organization is a complex IT engine managing numerous users, lots of new resources, rich applications, and new concepts around healthcare service delivery. Here's the reality – the pace of healthcare innovation isn't slowing down. As healthcare IT security complexity increases, managers and executives need to find better - more proactive - ways to manage...

  • How Cybersecurity Affects the Evolving Healthcare CISO Role

    March 14, 2017 - The healthcare C-suite continues to evolve, along with the increasingly complex cybersecurity threats. Healthcare CISOs must now have knowledge in many areas, and understand just how far data breach repercussions can go.  The Chief Information Security Officer (CISO) role has greatly increased over the past few years, according to Medical University of South Carolina (MUSC) CISO Matt...


Today's Top Stories

Ransomware Attack Mitigation in Updated ONC SAFER Guide

Best practices for ransomware attack mitigation and prevention, along with general contingency planning, were recently discussed in updated SAFER Guides from the ONC. First published in January 2014, the SAFER Guides “provide an easy-to-use...

Administrative Safeguard Need Highlighted in PA Indictment

Healthcare organizations must ensure that they have comprehensive and regularly updated administrative safeguards, such as user authentication measures and proper access control. A failure to have these in place, or having outdated ones, could...

How Do HIPAA Regulations Apply to Wearable Devices?

Both covered entities and business associates should be well-aware of the OCR HIPAA audit program, especially as Phase 2 has been underway for several months now. However, as technology continues to evolve, there are also several areas that could...

Computer Virus Potentially Exposes PHI of 2.5K at OR Clinic

A technician at Lane Community College health clinic recently discovered a computer virus, which may have exposed the PHI of some patients, according to an online statement. The Oregon college health clinic stated the virus may have been sending...

Survey Finds Cloud Security, IoT Security Potentially Lacking

While the majority of organizations utilize advanced technology for sensitive data, including cloud, IoT, and big data, those same entities might not be implementing appropriate data security solutions, according to a recent survey. Lagging cloud...

3 Critical Steps for Managing Third-Party Access to Your EHR

Before a hospital grants any kind of network access to users from an outside organization, like a physician’s practice, it must determine to whom access is granted and for how long. It is a complex and essential process. This article will...

How Healthcare Cybersecurity Measures Affect National Approach

Earlier this month, the Subcommittee on Cybersecurity and Infrastructure Protection of the Homeland Security Committee held a hearing to determine the value and effectiveness of the current engagement between the private sector and the Department...

View all stories

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks