Healthcare Information Security

Features

Medical Device Security Requires Collaborative Action from Industry

Medical device security has become a much bigger concerns for healthcare organizations since ransomware attackers began using vulnerable medical devices in their attack campaigns. There has always been industry and regulatory concern about the risks that vulnerable medical devices could posed to patient safety. However, attackers using medical devices to harm patients is a rare occurrenc...


More Features

How Healthcare Providers, Vendors Can Collaborate on IT Security

Healthcare providers and vendors struggle with some of the same  IT security challenges. When working with vendors around security issues, healthcare organizations need to go beyond the business associate agreement (BAA) required by HI...

Perils of Healthcare Phishing and What You Can Do About It

The old stereotype used to be that doctors didn’t work on Wednesday because they were out playing golf or fishing. Today, healthcare phishing is no joke to doctors, many of whom work on Wednesdays and weekends, or for other healthcare...

Defending Against Healthcare Ransomware Attacks

Healthcare ransomware attacks have become a security nightmare for many organizations over the last couple of years. Ransomware is a type of malware that prevents or limits users from accessing their systems, either by locking the systems&r...

What Healthcare Providers Must Know About the HIPAA Security Rule

Healthcare organizations are facing increasingly sophisticated cybersecurity attacks, which is pushing entities to remain vigilant in keeping protected health in formation (PHI) secure. The HIPAA Security Rule is a national standard that ca...

The Difference Between Healthcare Data Encryption, De-identification

As healthcare organizations invest in the latest technological advances for cost savings and better patient care, cybersecurity measures must also be considered. Healthcare data encryption and the de-identification of data are two essential...

Laying the Foundation for Strong Healthcare Risk Management

With cybersecurity threats becoming more sophisticated each day, healthcare organizations must implement necessary policies and procedures to keep sensitive data secure. A current and comprehensive healthcare risk management plan is a key c...

Training Employees to Avoid Healthcare Data Security Threats

Large-scale healthcare data breaches have already impacted millions of individuals in 2017 alone. As organizations rely more and more heavily on a growing number of technologies, the need for preparing for healthcare data security threats i...

Benefits, Challenges of Secure Healthcare Data Sharing

The continued push for nationwide interoperability has helped fuel the growth of secure healthcare data sharing. Covered entities and business associates are exploring how to enhance patient care by engaging in health information exchange (...

Prioritizing Data Security Strategies for Health IT Infrastructure

A secure yet accessible health IT infrastructure is a fundamental requirement for all healthcare organizations.   As providers adopt more digital technologies, including electronic health records, data warehouses, advanced wireless net...

How HIPAA Regulations Apply to Key Patient Data Access Situations

Individuals have an inherent right to access their own health information. Patient data access can be a critical tool for proper care, but both providers and patients often face confusion about how HIPAA regulations impact the exchange and ...

Ensuring Security, Access to Protected Health Information (PHI)

Healthcare data breaches are sadly a regular occurrence in the industry, and there is no indication that the trend will slow down. With cybersecurity threats such as ransomware and malware becoming a popular choice for cyber criminals to ga...

Mental Health Data Security Critical in HIPAA Compliance

Mental healthcare is becoming an increasingly critical national issue. Covered entities and business associates that specialize in mental health are required to adhere to HIPAA regulations for maintaining, transferring, or sharing mental he...

What is a HIPAA Business Associate Agreement (BAA)?

With the continued growth of healthcare data and a higher degree of interoperability between provider systems, HIPAA covered entities will need to form partnerships with other organizations to ensure the security of their data assets. These...

Utilizing Cloud Computing for Stronger Healthcare Data Security

As healthcare providers continue to make the switch to digital records and implement EHR capabilities, being able to store information offsite is becoming more important. The digital data also likely needs to remain accessible from multiple...

Data Security Considerations in Healthcare Interoperability

While more healthcare organizations are utilizing electronic health records (EHRs) and adding to the increase in healthcare interoperability finding a health IT option that provides better patient care and keeps PHI secure is not always eas...

Implementing Cybersecurity Frameworks in Healthcare Settings

Cybersecurity is no longer a topic that healthcare organizations can ignore, especially with covered entities working toward interoperability, implementing connected medical devices, and utilizing EHRs. There are several cybersecurity frame...

How FDA Medical Device Cybersecurity Guidance Affects Providers

With the continued push for interoperability and integration of EHRs into daily use, connected medical devices are quickly becoming more common tools for healthcare providers. However, similar to the way computer networks and systems can be...

State Data Breach Notification Laws Critical to Healthcare Orgs

The HIPAA Privacy, Security, and Data Breach Notification Rules require covered entities and business associates to take great care with how PHI is handled, stored, and transferred. Should patient data become compromised, healthcare organiz...

Enabling Providers to Use Truly HIPAA Compliant Email

As technology continues to evolve, healthcare organizations of all sizes are working to remain current in what they can offer to providers and patients while also keeping PHI secure. Covered entities now have various options of communicatio...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks