Healthcare Information Security
  • Healthcare Cybersecurity Threats Hinder HIT Development

    February 21, 2018 - Healthcare organizations across the globe are working to adopt and deploy EHRs without opening themselves up to interoperability issues, healthcare cybersecurity threats, and HIT infrastructure problems, according to a recent Black Book survey. Ninety percent of international respondents said confusion continues to exist around the definition of a highly interoperable EHR system outside the...

  • How the FTC Act, HIPAA Privacy Rule Impact Healthcare Orgs

    February 19, 2018 - Collecting and sharing consumer health information is fairly standard practice for covered entities and their business associates. Organizations must ensure that they remain in compliance with the HIPAA Privacy Rule throughout that entire process, and keep individuals informed on how their data is potentially being used. However, entities must also comply with the Federal Trade Commission...

  • How Does HIPAA Compliance Apply in the Healthcare Cloud?

    February 14, 2018 - Only a handful of years ago, security and healthcare professionals deemed hosting healthcare data in the cloud to be untenable. However, the evolution of the healthcare industry as well as cloud solutions has really changed the perspective for many. A 2016 IDC Health Insights report showed that providers are increasingly taking advantage of cloud implementations and leveraging mobile and analytics...

  • Implementing the NIST CSF for Improved Healthcare Data Security

    February 12, 2018 - Cybersecurity frameworks are often cited as key ways for organizations to improve their approach to healthcare data security, especially as more entities utilize connected devices and work toward interoperability. The National Institute of Standards and Technology (NIST) has one of the more popular frameworks, which was first published in February 2014 under a presidential executive order...


Today's Top Stories

Healthcare Cybersecurity Threats Hinder HIT Development

Healthcare organizations across the globe are working to adopt and deploy EHRs without opening themselves up to interoperability issues, healthcare cybersecurity threats, and HIT infrastructure problems, according to a recent Black Book survey....

Common Rule Interim Version Released, Exempts HIPAA Research

More secondary research of EHR data will be enabled through the recently announced interim version of the Federal Policy for the Protection of Human Subjects, or the Common Rule. Certain low-risk studies, such as observational studies meant to...

Amended Data Privacy Law Proposed in Colorado Legislature

The Colorado House Committee on State, Veterans, and Military Affairs unanimously approved an amended data privacy law that would require entities to implement “reasonable security procedures” to protect consumers’ personal...

Health IoT Security Top Connected Technology Application Area

Policymakers, managers, and standards participants need to be properly informed and enabled to develop and use cybersecurity standards in IoT components, systems, and services, according to a NIST workgroup. Health IoT security and four other...

How the FTC Act, HIPAA Privacy Rule Impact Healthcare Orgs

Collecting and sharing consumer health information is fairly standard practice for covered entities and their business associates. Organizations must ensure that they remain in compliance with the HIPAA Privacy Rule throughout that entire process,...

Hospital Data Breaches Most Common, Affect the Most Patients

Hospital data breaches accounted for approximately 30 percent of large data security incidents reported to OCR from 2009 to 2016, according to a study published in the American Journal of Managed Care (AJMC). The largest number of individuals...

Asymmetrik Wins ONC Challenge with Secure FHIR Server

The Office of the National Coordinator for Health Information Technology (ONC) named Asymmetrik as the winner of the Secure API Server Showdown earlier this week. Asymmetrik developed a secure FHIR server using Node.js and has the source code...

View all stories

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks