Healthcare Information Security

Features

Complying with the HIPAA Privacy Rule During Emergency Situations

Emergency situations and natural disasters, such as hurricanes, pandemics, or mass casualties, can quickly overwhelm healthcare systems. The last thing on people’s minds in those situations is complying with the HIPAA Privacy Rule. Sometimes, but not always, HHS steps in and issues a waiver of some HIPAA requirements. For example, during Hurricane Florence, which ravaged the Caroli...


More Features

Patient Privacy Rights Education Requires Provider Input

For healthcare to work for everyone, providers and other organizations face the responsibility of providing patient privacy rights education and safeguarding patient data. When a patient goes to the doctor for the first time, he or she...

Medical Device Security Requires Collaborative Action from Industry

Medical device security has become a much bigger concerns for healthcare organizations since ransomware attackers began using vulnerable medical devices in their attack campaigns. There has always been industry and regulatory concern about ...

How Healthcare Providers, Vendors Can Collaborate on IT Security

Healthcare providers and vendors struggle with some of the same  IT security challenges. When working with vendors around security issues, healthcare organizations need to go beyond the business associate agreement (BAA) required by HI...

Perils of Healthcare Phishing and What You Can Do About It

The old stereotype used to be that doctors didn’t work on Wednesday because they were out playing golf or fishing. Today, healthcare phishing is no joke to doctors, many of whom work on Wednesdays and weekends, or for other healthcare...

Defending Against Healthcare Ransomware Attacks

Healthcare ransomware attacks have become a security nightmare for many organizations over the last couple of years. Ransomware is a type of malware that prevents or limits users from accessing their systems, either by locking the systems&r...

What Healthcare Providers Must Know About the HIPAA Security Rule

Healthcare organizations are facing increasingly sophisticated cybersecurity attacks, which is pushing entities to remain vigilant in keeping protected health in formation (PHI) secure. The HIPAA Security Rule is a national standard that ca...

The Difference Between Healthcare Data Encryption, De-identification

As healthcare organizations invest in the latest technological advances for cost savings and better patient care, cybersecurity measures must also be considered. Healthcare data encryption and the de-identification of data are two essential...

Laying the Foundation for Strong Healthcare Risk Management

With cybersecurity threats becoming more sophisticated each day, healthcare organizations must implement necessary policies and procedures to keep sensitive data secure. A current and comprehensive healthcare risk management plan is a key c...

Training Employees to Avoid Healthcare Data Security Threats

Large-scale healthcare data breaches have already impacted millions of individuals in 2017 alone. As organizations rely more and more heavily on a growing number of technologies, the need for preparing for healthcare data security threats i...

Benefits, Challenges of Secure Healthcare Data Sharing

The continued push for nationwide interoperability has helped fuel the growth of secure healthcare data sharing. Covered entities and business associates are exploring how to enhance patient care by engaging in health information exchange (...

Prioritizing Data Security Strategies for Health IT Infrastructure

A secure yet accessible health IT infrastructure is a fundamental requirement for all healthcare organizations.   As providers adopt more digital technologies, including electronic health records, data warehouses, advanced wireless net...

How HIPAA Regulations Apply to Key Patient Data Access Situations

Individuals have an inherent right to access their own health information. Patient data access can be a critical tool for proper care, but both providers and patients often face confusion about how HIPAA regulations impact the exchange and ...

Ensuring Security, Access to Protected Health Information (PHI)

Healthcare data breaches are sadly a regular occurrence in the industry, and there is no indication that the trend will slow down. With cybersecurity threats such as ransomware and malware becoming a popular choice for cyber criminals to ga...

Mental Health Data Security Critical in HIPAA Compliance

Mental healthcare is becoming an increasingly critical national issue. Covered entities and business associates that specialize in mental health are required to adhere to HIPAA regulations for maintaining, transferring, or sharing mental he...

What is a HIPAA Business Associate Agreement (BAA)?

With the continued growth of healthcare data and a higher degree of interoperability between provider systems, HIPAA covered entities will need to form partnerships with other organizations to ensure the security of their data assets. These...

Utilizing Cloud Computing for Stronger Healthcare Data Security

As healthcare providers continue to make the switch to digital records and implement EHR capabilities, being able to store information offsite is becoming more important. The digital data also likely needs to remain accessible from multiple...

Data Security Considerations in Healthcare Interoperability

While more healthcare organizations are utilizing electronic health records (EHRs) and adding to the increase in healthcare interoperability finding a health IT option that provides better patient care and keeps PHI secure is not always eas...

Implementing Cybersecurity Frameworks in Healthcare Settings

Cybersecurity is no longer a topic that healthcare organizations can ignore, especially with covered entities working toward interoperability, implementing connected medical devices, and utilizing EHRs. There are several cybersecurity frame...

How FDA Medical Device Cybersecurity Guidance Affects Providers

With the continued push for interoperability and integration of EHRs into daily use, connected medical devices are quickly becoming more common tools for healthcare providers. However, similar to the way computer networks and systems can be...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks