Healthcare Information Security

Healthcare Information Security Interviews

Partnership Uses Blockchain Technology To Secure Fertility Data

by Fred Donovan

A partnership between Donor Concierge and ALTR will use blockchain technology to secure health data and patient privacy for FRTYL, a service that links fertility agencies and clinics with parents seeking infertility treatments. ALTR’s...

Smart Wristband Raises Health Data Security, Privacy Concerns

by Fred Donovan

Rutgers University researchers have created a new smart wristband with a biosensor that can count particles in the user’s blood and transmit that data via Bluetooth to a nearby smartphone. While this technology could have a major impa...

For ASCs, Size Matters When It Comes to Healthcare Cybersecurity

by Fred Donovan

For ambulatory surgery centers (ASCs), healthcare cybersecurity challenges and responses are different depending on the size of the operation, observed Tom Hui, founder of SurgiCenter Information Systems and CEO of HSTpathways. Hui noted th...In the interview, Hui also touched on the issue of medical device security in ASCs. These devices generate and transmit lots of data over the local network. That data is usually not encrypted. “The data is only as safe as the network ...

How Does HIPAA Apply to Wearable Health Technology?

by Fred Donovan

The use of wearable health technology is expected to expand substantially within the next few years. Wearable devices offer many health tracking capabilities, including measuring heart rate, number of steps taken per day, and glucose and ac...

Helping Struggling Hospitals Recover from Ransomware Attacks

by Fred Donovan

The biggest cybersecurity issue for hospitals is response and recovery from ransomware attacks, observed Fernando Martinez, senior vice president and chief digital officer at the Texas Hospital Association and president/CEO of Texas Hospita...The Texas Hospital Association has developed a simulated phishing email service for its member hospitals to train them on how to spot phishing emails and avoid falling for those exploits. The association partners with companies that can hel...

Applying Inogen Data Breach Lessons to Healthcare Providers

by Fred Donovan

The recent Inogen data breach, in which hackers were able to penetrate an employee’s email account, highlights the need for healthcare organizations to use multifactor authentication (MFA) to control access and to get robust cybe...

Preparing for a Potential Healthcare Data Breach Investigation

by Elizabeth Snell

A current and comprehensive risk management plan, including a good auditing process, will be critical for organizations that must deal with a healthcare data breach investigation. Covered entities and business associates will be better able...

Uber Health Prioritizes Patient Data Security, HIPAA Compliance

by Elizabeth Snell

Ridesharing company Uber launched a platform in March 2018 that aimed to provide more transportation options to patients. Individuals can use Uber Health to get a ride to their provider, while being reassured that HIPAA compliance remains a...

Threat Intelligence Sharing Essential for Healthcare Cybersecurity

by Elizabeth Snell

The National Health Information Sharing and Analysis Center (NH-ISAC) constantly stresses the need for threat intelligence sharing in the healthcare sector, especially as cybersecurity threats grow increasingly sophisticated. Heal...

What the CareFirst Data Breach Decision Means for Healthcare

by Elizabeth Snell

In February 2018, the US Supreme Court denied certiorari in the CareFirst data breach case. CareFirst had requested the Court review the class action lawsuit against it that came from two separate incidents. The first occurred in June 2014,...

Focusing on Healthcare Data Privacy with Information Governance

by Elizabeth Snell

Healthcare data privacy and security is one of the top industry challenges, but a comprehensive and holistic information governance (IG) program can be essential in overcoming it. Information governance is not often considered with cybersec...

Healthcare Risk Assessments Key Driver for Security Investments

by Elizabeth Snell

More providers are adopting cybersecurity frameworks and prioritizing risk assessment, according to the third annual Symantec and HIMSS Analytics HIT Security and Risk Management Study. However, organizations are still underinvesting in cyb...

Achieving Healthcare Compliance, Security in Provider Settings

by Elizabeth Snell

Providers need to maintain healthcare compliance and ensure their data security measures are strong enough to combat ever-evolving threats. However, compliance and security are not interchangeable and entities must focus on both for compreh...

Healthcare Blockchain Key Component for Trusted Data Exchange

by Elizabeth Snell

Healthcare blockchain is quickly becoming a hot topic in the industry, but data privacy and security and how data will be properly utilized are key concerns for the technology. Blockchain could play a key role though in the future of health...

Implementing the NIST CSF for Improved Healthcare Data Security

by Elizabeth Snell

Cybersecurity frameworks are often cited as key ways for organizations to improve their approach to healthcare data security, especially as more entities utilize connected devices and work toward interoperability. The National Institute of ...

Crafting a Strong Healthcare Cybersecurity Action Plan

by Elizabeth Snell

Following recent research showing that 83 percent of physicians report they have experienced a cybersecurity attack, AHIMA released a healthcare cybersecurity action plan to assist entities in preparing for potential threats. Implementing a...

How an Ohio Hospital Avoided a Widespread Ransomware Attack

by Elizabeth Snell

Having the necessary and applicable data security tools in place, along with comprehensive employee education, are critical for ransomware attack prevention measures. Organizations of all sizes need to be aware of the potential threats and ...

Recognizing, Overcoming Medical Device Cybersecurity Gaps

by Elizabeth Snell

Legacy devices and not having an accurate understanding of current device inventory can lead to some of the more common medical device cybersecurity gaps. Healthcare organizations cannot afford to suffer from an attack that compromises conn...

Secure Health Data Exchange Key Focus for AMA Investment

by Elizabeth Snell

The nationwide push for interoperability has helped fuel the desire for healthcare to find ways to implement secure health data exchange. Information should be able to flow freely, but data security concerns can be a great hindrance in enti...

What Should Entities Expect with OCR HIPAA Enforcement?

by Elizabeth Snell

There have been nine OCR HIPAA enforcement settlements so far in 2017, highlighting the need for covered entities and business associates to focus on audit controls, risk management, and business associate agreements. While there has been a...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks