Healthcare Information Security
  • Best Practices to Secure Healthcare IoT, Connected Devices

    May 23, 2018 - We live in a connected world. This spans the data center, healthcare IoT, and the enterprise data center. In fact, many of you reading this right now may well have a Nest or Philips Hue in your house. Some of you, like me, might have even more connected devices. That said, let me bring you back to the events of October 21, 2016. This was the day we experienced one of the most impactful distributed...

  • Approaching the Top 5 Healthcare Cloud Security Concerns

    May 21, 2018 - In working with a variety of healthcare organizations, there’s still some hesitation when it comes to moving into a cloud ecosystem, with several healthcare cloud security concerns coming to light. Before we go too much further, I’d like to disrupt that paradigm and let you know that, when deployed properly, cloud can be a powerful ally for a healthcare organization. Just a few...

  • Does EHR Patient Access Fall Short of HIPAA Compliance?

    May 16, 2018 - Patients and healthcare organizations face numerous challenges when providing EHR patient access for HIPAA compliance, according to a report released May 14 by the Government Accountability Office (GAO). Among the challenges faced by patients are high fees when requesting medical records and a lack of understanding about their rights under HIPAA to access their records. High fees are...

  • Amazon’s Alexa Healthcare Team Bones Up on HIPAA Compliance

    May 14, 2018 - Amazon is becoming very familiar with HIPAA compliance requirements as part of its effort to expand the Alexa digital assistant’s role in providing healthcare information and advice, CNBC is reporting. Amazon has set up a health and wellness team within its Alexa division to make the digital voice assistant more useful in the healthcare field, according to an internal company document...


Today's Top Stories

Ransomware Attack Worries Healthcare IT Pros the Most

A ransomware attack is the type of cyberattack that most worries healthcare IT professionals, according to a survey of 102 HIMSS18 attendees by security firm Imperva. Almost 10 percent of those surveyed had paid a ransom or extortion fee, while...

Public Server Exposure Creates PHI Data Security Worries for 200K

Unsecured files on a public FTP server maintained by Arkansas-based practice management software provider MedEvolve may have caused a PHI data security breach for more 200,000 patients, reported DataBreaches.net. Most of the patient files on...

Best Practices to Secure Healthcare IoT, Connected Devices

We live in a connected world. This spans the data center, healthcare IoT, and the enterprise data center. In fact, many of you reading this right now may well have a Nest or Philips Hue in your house. Some of you, like me, might have even more...

Older Healthcare OSes Open to Cybersecurity Vulnerabilities

The healthcare industry is the slowest industry in upgrading to Windows 10, meaning that many in healthcare are running older versions of Windows more susceptible to cybersecurity vulnerabilities, according to the latest data from Duo Security....

Data on 500K Patients Exposed in LifeBridge Healthcare Data Breach

LifeBridge Health, a healthcare provider located in northwest Baltimore, has notified more than 500,000 patients that their personal information may have been exposed in a September 2016 healthcare data breach, the provider said in a statement...

Healthcare Ransomware Attacks Soared in Q3 2017

The number of healthcare ransomware attacks exploded in the third quarter of 2017, far outpacing all other types of cyberattacks against healthcare companies, but then dropped off sharply in the fourth quarter, according to the latest data from...

HITRUST Unveils Certification for NIST Cybersecurity Framework

The Health Information Trust Alliance (HITRUST) launched May 22 a certification program for the NIST Cybersecurity Framework (CSF) that makes it easier for security teams to report on their implementation of the framework to upper management,...

View all stories

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks