Healthcare Information Security
  • How Does HIPAA Compliance Apply in the Healthcare Cloud?

    February 14, 2018 - Only a handful of years ago, security and healthcare professionals deemed hosting healthcare data in the cloud to be untenable. However, the evolution of the healthcare industry as well as cloud solutions has really changed the perspective for many. A 2016 IDC Health Insights report showed that providers are increasingly taking advantage of cloud implementations and leveraging mobile and analytics...

  • Implementing the NIST CSF for Improved Healthcare Data Security

    February 12, 2018 - Cybersecurity frameworks are often cited as key ways for organizations to improve their approach to healthcare data security, especially as more entities utilize connected devices and work toward interoperability. The National Institute of Standards and Technology (NIST) has one of the more popular frameworks, which was first published in February 2014 under a presidential executive order...

  • Decatur County General EMR Security Incident Impacts 24K

    February 8, 2018 - Tennessee-based Decatur County General Hospital experienced an EMR security incident when unauthorized software was installed on the server the EMR vendor supports on the organization’s behalf. Decatur County received a security incident report from its vendor on November 27, 2017, the organization said in an online statement. “The unauthorized software was installed to generate...

  • How Much Do Healthcare Data Breaches Cost Organizations?

    February 5, 2018 - Healthcare data breaches can be devastating for any covered entity, but the subsequent recovery costs are often quite expensive. Implementing technological tools to aid in prevention and detection measures are not cheap, but not taking necessary steps to head off potential issues will likely result in more expensive recovery costs. The three most recent Cost of a Data Breach Studies from Ponemon...


Today's Top Stories

Hospital Data Breaches Most Common, Affect the Most Patients

Hospital data breaches accounted for approximately 30 percent of large data security incidents reported to OCR from 2009 to 2016, according to a study published in the American Journal of Managed Care (AJMC). The largest number of individuals...

Asymmetrik Wins ONC Challenge with Secure FHIR Server

The Office of the National Coordinator for Health Information Technology (ONC) named Asymmetrik as the winner of the Secure API Server Showdown earlier this week. Asymmetrik developed a secure FHIR server using Node.js and has the source code...

36K Notified of Potential Healthcare Data Breach from Mailing Error

A mailing error has led to a potential healthcare data breach for Triple-S Advantage (Triple-S) members, according to an online company statement. The Puerto Rico-based organization is an independent licensee of the BlueCross BlueShield Association....

How Does HIPAA Compliance Apply in the Healthcare Cloud?

Only a handful of years ago, security and healthcare professionals deemed hosting healthcare data in the cloud to be untenable. However, the evolution of the healthcare industry as well as cloud solutions has really changed the perspective for...

Filefax PHI Disclosure Leads to $100K OCR HIPAA Settlement

Filefax, Inc. went out of business in 2017, but that does not mean that an OCR HIPAA settlement can be avoided due to an earlier PHI disclosure, according to OCR. A company that was appointed as a receiver to liquidate Filefax’s assets...

Healthcare Data Privacy, Security Concerns Hinder Digital Adoption

Healthcare data privacy and security concerns are pushing healthcare payers and providers to reconsider whether or not they want to adopt mobile and digital health tools, according to the 8th Annual Industry Pulse Report from Change Healthcare...

VA Facility Lacking Security Risk Assessment, Security Controls

The Veterans Services Adaptable Network (VSAN) at the Orlando Veterans Affairs Medical Center (VAMC) was not fully coordinated with the Office of Information and Technology (OI&T), which included not having a security risk assessment, according...

View all stories

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks