Healthcare Information Security

Healthcare Information Security Interviews

How to Build a Balanced Healthcare Cybersecurity Budget

by Jessica Davis

The majority of healthcare security stakeholders agree that cybersecurity budgets are underfunded. And frankly, health organizations aren’t keeping pace with hackers who are continuously improving in sophistication. Data security prog...The remaining 20 percent of the budget should focus on disaster recovery and business continuity. “One thing to note here is that it’s all talking about the technologies: I haven’t brought in people. These buckets help out...But just how often should an organization assess its vendors and tools? “Everyone’s situation is of different: posture is different, the environment is different,” said Mookencherry. “It depends on the size of organi...Those details should be combined with the cost of regulations, payments, intellectual property and brand reputation. Mookencherry explained that organizations also have “obligations for trying to understand how you’re going to i...

Iron-Clad HIPAA, EULAs; But Can a Dispute Put Patient Data at Risk?

by Jessica Davis

A recent breach notification has left many scratching their heads. Key Dental Group notified patients their data was potentially breached when an EMR vendor allegedly refused to return a patient database. In the notification, the Florida-ba...The vendor did not contact Heinicke about the database, including the transfer to the purchaser, “ultimately terminating the EULA with Key Dental Group and then refusing to provide the database back to KDG upon demand, as was KDG'...

Building a Secure Vendor Relationship with Inventory, Management

by Jessica Davis

The healthcare sector has been a primary target of hackers for more than a year, and the attacks continue to increase in sophistication. While many providers have adjusted their security posture in attempt to shore up some of these threats,...

Healthcare’s Dependence on Fax Machines Poses Risk to Health Data

by Jessica Davis

While the healthcare sector has some of the most advanced technology available, it’s oft perplexing to discover that about 75 percent of all healthcare communications are still processed by the antiquated fax machine. Security researc...The goal, CMS Administrator Seema Verma said at ONC’s Interoperability Forum, was to develop a free flow of information between patients, insurers and healthcare providers. In doing so, she encouraged developers to create an alternati...

Partnership Uses Blockchain Technology To Secure Fertility Data

by Fred Donovan

A partnership between Donor Concierge and ALTR will use blockchain technology to secure health data and patient privacy for FRTYL, a service that links fertility agencies and clinics with parents seeking infertility treatments. ALTR’s...

Smart Wristband Raises Health Data Security, Privacy Concerns

by Fred Donovan

Rutgers University researchers have created a new smart wristband with a biosensor that can count particles in the user’s blood and transmit that data via Bluetooth to a nearby smartphone. While this technology could have a major impa...

For ASCs, Size Matters When It Comes to Healthcare Cybersecurity

by Fred Donovan

For ambulatory surgery centers (ASCs), healthcare cybersecurity challenges and responses are different depending on the size of the operation, observed Tom Hui, founder of SurgiCenter Information Systems and CEO of HSTpathways. Hui noted th...In the interview, Hui also touched on the issue of medical device security in ASCs. These devices generate and transmit lots of data over the local network. That data is usually not encrypted. “The data is only as safe as the network ...

How Does HIPAA Apply to Wearable Health Technology?

by Fred Donovan

The use of wearable health technology is expected to expand substantially within the next few years. Wearable devices offer many health tracking capabilities, including measuring heart rate, number of steps taken per day, and glucose and ac...

Helping Struggling Hospitals Recover from Ransomware Attacks

by Fred Donovan

The biggest cybersecurity issue for hospitals is response and recovery from ransomware attacks, observed Fernando Martinez, senior vice president and chief digital officer at the Texas Hospital Association and president/CEO of Texas Hospita...The Texas Hospital Association has developed a simulated phishing email service for its member hospitals to train them on how to spot phishing emails and avoid falling for those exploits. The association partners with companies that can hel...

Applying Inogen Data Breach Lessons to Healthcare Providers

by Fred Donovan

The recent Inogen data breach, in which hackers were able to penetrate an employee’s email account, highlights the need for healthcare organizations to use multifactor authentication (MFA) to control access and to get robust cybe...

Preparing for a Potential Healthcare Data Breach Investigation

by Elizabeth Snell

A current and comprehensive risk management plan, including a good auditing process, will be critical for organizations that must deal with a healthcare data breach investigation. Covered entities and business associates will be better able...

Uber Health Prioritizes Patient Data Security, HIPAA Compliance

by Elizabeth Snell

Ridesharing company Uber launched a platform in March 2018 that aimed to provide more transportation options to patients. Individuals can use Uber Health to get a ride to their provider, while being reassured that HIPAA compliance remains a...

Threat Intelligence Sharing Essential for Healthcare Cybersecurity

by Elizabeth Snell

The National Health Information Sharing and Analysis Center (NH-ISAC) constantly stresses the need for threat intelligence sharing in the healthcare sector, especially as cybersecurity threats grow increasingly sophisticated. Heal...

What the CareFirst Data Breach Decision Means for Healthcare

by Elizabeth Snell

In February 2018, the US Supreme Court denied certiorari in the CareFirst data breach case. CareFirst had requested the Court review the class action lawsuit against it that came from two separate incidents. The first occurred in June 2014,...

Focusing on Healthcare Data Privacy with Information Governance

by Elizabeth Snell

Healthcare data privacy and security is one of the top industry challenges, but a comprehensive and holistic information governance (IG) program can be essential in overcoming it. Information governance is not often considered with cybersec...

Healthcare Risk Assessments Key Driver for Security Investments

by Elizabeth Snell

More providers are adopting cybersecurity frameworks and prioritizing risk assessment, according to the third annual Symantec and HIMSS Analytics HIT Security and Risk Management Study. However, organizations are still underinvesting in cyb...

Achieving Healthcare Compliance, Security in Provider Settings

by Elizabeth Snell

Providers need to maintain healthcare compliance and ensure their data security measures are strong enough to combat ever-evolving threats. However, compliance and security are not interchangeable and entities must focus on both for compreh...

Healthcare Blockchain Key Component for Trusted Data Exchange

by Elizabeth Snell

Healthcare blockchain is quickly becoming a hot topic in the industry, but data privacy and security and how data will be properly utilized are key concerns for the technology. Blockchain could play a key role though in the future of health...

Implementing the NIST CSF for Improved Healthcare Data Security

by Elizabeth Snell

Cybersecurity frameworks are often cited as key ways for organizations to improve their approach to healthcare data security, especially as more entities utilize connected devices and work toward interoperability. The National Institute of ...

Crafting a Strong Healthcare Cybersecurity Action Plan

by Elizabeth Snell

Following recent research showing that 83 percent of physicians report they have experienced a cybersecurity attack, AHIMA released a healthcare cybersecurity action plan to assist entities in preparing for potential threats. Implementing a...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy


no, thanks

Continue to site...