Healthcare Information Security
  • Healthcare Cybersecurity Measures Must Evolve for Success

    June 21, 2017 - The cybersecurity skills gap is affecting numerous industries. However, healthcare cybersecurity measures truly cannot afford to fall behind, according to ISACA Board Director Rob Clyde. Citing data from the recent ISACA State of Cyber Security 2017 report, Clyde stressed that lackluster healthcare data security can affect individual’s lives. However, it can be difficult to...

  • Overcoming the Healthcare Cybersecurity Workforce Shortage

    June 20, 2017 - Having a well-trained healthcare cybersecurity workforce is critical for covered entities, especially as organizations continue to implement new technologies. However, a recent (ISC)²  report found that there is an increasing cybersecurity workforce gap. The Global Information Security Workforce Study (GISW) found 70 percent of employers around the globe want to increase their cybersecurity...

  • Healthcare Data Encryption not ‘Required,’ but Very Necessary

    June 14, 2017 - Healthcare cybersecurity is essential for covered entities of all sizes, especially as ransomware attacks and other types of malware become more common. Healthcare data encryption is often discussed in these situations as well, with many in the industry underlining its importance. HIPAA regulations do not specifically require data encryption, and instead qualify it as an “addressable”...

  • Utilizing Secure Texting for Efficient, Simple Communications

    June 13, 2017 - Maintaining HIPAA compliance in provider-to-patient communication and even in physician-to-physician communication is critical, which is why secure texting has increased in popularity. With technology evolving, organizations cannot afford to compromise PHI through SMS texting or an unsecured email. However, covered entities also desire a simple and efficient way to transfer information that...


Today's Top Stories

Airway Oxygen Ransomware Attack May Affect PHI of 500K

Michigan-based Airway Oxygen, Inc. is notifying patients that their PHI may have been involved in a ransomware attack that took place earlier this year. The medical equipment supply company explained in its notification letter to individuals...

FDA Implementing Risk-Based Medical Device Regulation

The FDA will soon launch a new Digital Health Innovation Plan, which will include a focus on implementing a risk-based approach to medical device regulation, according to FDA Commissioner Scott Gottlieb, MD. Gottlieb explained in a recent...

Key Ransomware Prevention Measures in Recent Executive Order

An executive order signed by the president in May 2017 has important guidelines and priorities organizations can follow to improve their cybersecurity, including instilling stronger ransomware prevention, according to a blog post by UC Berkeley...

Improper Disposal Creates PHI Security Concern for 1.8K

On June 16, the Texas Health and Human Services Commission (HHSC) notified patients of a recent potential security breach that may have involved the PHI of 1,842 residents of the Houston area. The incident was discovered when a box of forms containing...

Patient Safety, PHI Security Key in HHS Cybersecurity Role

The recent WannaCry ransomware attack shows how patient safety, along with PHI security, need to be key focus areas in the HHS cybersecurity role, according to the House Subcommittee on Oversight and Investigations. In a hearing held earlier...

Healthcare Cybersecurity Measures Must Evolve for Success

The cybersecurity skills gap is affecting numerous industries. However, healthcare cybersecurity measures truly cannot afford to fall behind, according to ISACA Board Director Rob Clyde. Citing data from the recent ISACA State of Cyber Security...

Healthcare Data Breach Costs Highest for 7th Straight Year

Healthcare data breach costs are the highest among surveyed sectors for the seventh straight year, according to the 2017 Cost of a Data Breach Study: Global Overview. The average cost of a data breach is $3.62 million globally, which...

View all stories

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks