Healthcare Information Security
  • 4 Benefits and Barriers in Utilizing Healthcare Cloud

    August 21, 2017 - The healthcare cloud is becoming a more popular – and sometimes necessary – option for providers. Entities are evolving into the digital healthcare space, and are steering away from paper records. Data protection and business continuity measures are often cited as key cloud computing benefits. For example, healthcare organizations can create backup files for their systems. This...

  • Top 4 Key Concerns in Healthcare Mobile Security Options

    August 17, 2017 - It can be daunting to choose the right mobile tools to help a healthcare organization stay innovative. It can be even more daunting though to ensure that mobile security remains a top priority and that PHI stays secure. Healthcare IT leaders might see the value in implementing mobile options, but studies show that security is often a top concern. How can entities properly budget for mobile...

  • What Are Critical Considerations in Risk Management?

    August 10, 2017 - Healthcare risk management is an increasingly critical area as cybersecurity threats continue to evolve. Regardless of an organization’s size, it needs to ensure that the right policies, procedures, and tools are in place so staff members can properly protect PHI. Research is showing that more entities are focusing on cybersecurity, but malicious threats will also continue to become...

  • Focusing on Employee Training for Stronger Health IT Security

    August 9, 2017 - The American Hospital Association’s Hospital & Health Networks (H&HN) Most Wired rankings were released earlier this summer, and showed that providers are making great strides in their health IT security. Providers are looking toward secure messaging, secure texting, and more mobile devices to ensure patients receive proper care and that data stays safe. Several WVU...


Today's Top Stories

New Mexico Medicaid Data Security Requires Improvements

The New Mexico Human Services Department (HSD) has certain vulnerabilities in its Medicaid data security, which could put HSD operations at risk, according to a recent OIG investigation. HSD migrated from a legacy eligibility system to the Automated...

4 Benefits and Barriers in Utilizing Healthcare Cloud

The healthcare cloud is becoming a more popular – and sometimes necessary – option for providers. Entities are evolving into the digital healthcare space, and are steering away from paper records. Data protection and business continuity...

Improve Healthcare Authentication with New NIST Guide

NIST recently released updated digital identity guidelines for federal agencies looking to create a secure authentication process. While not designed for healthcare authentication specifically, the guidelines could help the industry ensure a...

Top 4 Key Concerns in Healthcare Mobile Security Options

It can be daunting to choose the right mobile tools to help a healthcare organization stay innovative. It can be even more daunting though to ensure that mobile security remains a top priority and that PHI stays secure. Healthcare IT leaders...

Phishing Attack May Impact PHI of 3.4K at CA Treatment Center

City of Hope in California recently suffered a data breach in which four staff member email accounts were accessed by an unauthorized party through an email phishing attack. The cancer research and treatment center employees received the phishing...

Texas Healthcare Privacy, Security Focus in Recent Partnership

Texas covered entities will now have assistance in working toward healthcare privacy and security compliance measures through a recent partnership between the Texas Health Services Authority (THSA) and Third Rock Incorporated. THSA will...

Do HIPAA Regulations Need Updates on Patient Privacy?

Current patient privacy laws, such as HIPAA regulations, may need to be adjusted to help individuals who are suffering from drug addiction, HHS Secretary Tom Price said in a recent White House press briefing. It is particularly devastating to...

View all stories

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks