Healthcare Information Security

Features

Ensuring Security, Access to Protected Health Information (PHI)

Healthcare data breaches are sadly a regular occurrence in the industry, and there is no indication that the trend will slow down. With cybersecurity threats such as ransomware and malware becoming a popular choice for cyber criminals to gain access to valuable data, such as protected health information (PHI) covered entities must have comprehensive healthcare data security measures. But why...


More Features

Mental Health Data Security Critical in HIPAA Compliance

Mental healthcare is becoming an increasingly critical national issue. Covered entities and business associates that specialize in mental health are required to adhere to HIPAA regulations for maintaining, transferring, or sharing mental health...

What is a HIPAA Business Associate Agreement (BAA)?

With the continued growth of healthcare data and a higher degree of interoperability between provider systems, HIPAA covered entities will need to form partnerships with other organizations to ensure the security of their data assets. These partnerships...

Utilizing Cloud Computing for Stronger Healthcare Data Security

As healthcare providers continue to make the switch to digital records and implement EHR capabilities, being able to store information offsite is becoming more important. The digital data also likely needs to remain accessible from multiple locations,...

Data Security Considerations in Healthcare Interoperability

While more healthcare organizations are utilizing electronic health records (EHRs) and adding to the increase in healthcare interoperability finding a health IT option that provides better patient care and keeps PHI secure is not always easy....

Implementing Cybersecurity Frameworks in Healthcare Settings

Cybersecurity is no longer a topic that healthcare organizations can ignore, especially with covered entities working toward interoperability, implementing connected medical devices, and utilizing EHRs. There are several cybersecurity frameworks...

How FDA Medical Device Cybersecurity Guidance Affects Providers

With the continued push for interoperability and integration of EHRs into daily use, connected medical devices are quickly becoming more common tools for healthcare providers. However, similar to the way computer networks and systems can become...

State Data Breach Notification Laws Critical to Healthcare Orgs

The HIPAA Privacy, Security, and Data Breach Notification Rules require covered entities and business associates to take great care with how PHI is handled, stored, and transferred. Should patient data become compromised, healthcare organizations...

Enabling Providers to Use Truly HIPAA Compliant Email

As technology continues to evolve, healthcare organizations of all sizes are working to remain current in what they can offer to providers and patients while also keeping PHI secure. Covered entities now have various options of communication,...

How Data Encryption Benefits Data Security

As healthcare organizations continue to make the switch from physical to electronic records, implement EHRs, and connect to HIEs, healthcare data encryption options have also increased in popularity. This is when covered entities or business...

How Evolving Healthcare Cybersecurity Threats Affect Providers

As healthcare providers work to implement the latest pieces of technology to improve patient care, the healthcare cybersecurity threats will also continue to evolve. Healthcare ransomware attacks, BYOD security, and healthcare data breaches continue...

HIPAA Data Breaches: What Covered Entities Must Know

As more healthcare organizations implement new technologies, connect to health information exchanges, and adopt electronic health record technology, they are potentially exposing themselves to more online threats and potential HIPAA data breaches....

The Role of Risk Assessments in Healthcare

A risk assessment helps covered entities ensure they are compliant with the HIPAA requirements in terms of physical, technical, and administrative safeguards. It also assists in showing potential areas where an organization might be putting PHI...

Why Blockchain Technology Matters for Healthcare Security

With technological innovations continuing to find a place in the healthcare industry, health data security must remain a top priority for organizations of all sizes. More electronic data is available than ever before, and covered entities are...

What Hospitals Should Know about Cloud Computing Security

With more healthcare organizations implementing mobile devices, and increasing their digital storage options, cloud computing security is quickly becoming a top healthcare industry issue. Healthcare cybersecurity concerns can often make covered...

BYOD Security in the Healthcare Setting

With mobile devices quickly becoming an integral part of daily operations at more healthcare organizations, both covered entities and their business associates need to ensure that they fully comprehend BYOD security and overall healthcare mobile...

How Ransomware Affects Hospital Data Security

Ransomware is a type of malware that typically prevents organizations from accessing certain parts of its system. For example, an entity and its users could be locked out from critical systems, such as EHRs, and may be unable to get in unless...

What Entities Need to Know about Upcoming OCR HIPAA Audits

The latest round of OCR HIPAA audits were announced earlier this year, leading many healthcare organizations to review their HIPAA compliance measures and ensure that all necessary policies and procedures have been properly documented. The second...

Increased EHR Adoption Raises Need for Robust EHR Security

EHR security is one small piece to the larger data security puzzle that healthcare organizations, especially those of a larger size, are becoming increasingly aware of and looking to address. Under HIPAA, covered entities have the responsibility...

How Healthcare Secure Texting, Messaging Impact the Industry

With the continued push for patient-centered care and ever-evolving technological options available to healthcare providers, secure texting and secure messaging have become an increasingly popular path for providers. Not only will secure texting...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks