Healthcare Information Security

Health IT Security and HIPAA News

New Mexico Medicaid Data Security Requires Improvements

by

The New Mexico Human Services Department (HSD) has certain vulnerabilities in its Medicaid data security, which could put HSD operations at risk, according to a recent OIG investigation. HSD migrated from a legacy eligibility system to the Automated...

4 Benefits and Barriers in Utilizing Healthcare Cloud

by

The healthcare cloud is becoming a more popular – and sometimes necessary – option for providers. Entities are evolving into the digital healthcare space, and are steering away from paper records. Data protection and business continuity...

Improve Healthcare Authentication with New NIST Guide

by

NIST recently released updated digital identity guidelines for federal agencies looking to create a secure authentication process. While not designed for healthcare authentication specifically, the guidelines could help the industry ensure a...

Top 4 Key Concerns in Healthcare Mobile Security Options

by

It can be daunting to choose the right mobile tools to help a healthcare organization stay innovative. It can be even more daunting though to ensure that mobile security remains a top priority and that PHI stays secure. Healthcare IT leaders...

Phishing Attack May Impact PHI of 3.4K at CA Treatment Center

by

City of Hope in California recently suffered a data breach in which four staff member email accounts were accessed by an unauthorized party through an email phishing attack. The cancer research and treatment center employees received the phishing...

Texas Healthcare Privacy, Security Focus in Recent Partnership

by

Texas covered entities will now have assistance in working toward healthcare privacy and security compliance measures through a recent partnership between the Texas Health Services Authority (THSA) and Third Rock Incorporated. THSA will...

Do HIPAA Regulations Need Updates on Patient Privacy?

by

Current patient privacy laws, such as HIPAA regulations, may need to be adjusted to help individuals who are suffering from drug addiction, HHS Secretary Tom Price said in a recent White House press briefing. It is particularly devastating to...

Medical Device Cybersecurity Top Challenge to IoT Ecosystem

by

Individuals working in the Internet of Things (IoT) connected medical device ecosystem are most concerned with potential medical device cybersecurity issues, according to a recent Deloitte poll. Nearly one-third of respondents – 35.6 percent...

How HHS’ HCCIC Will Improve Healthcare Cybersecurity

by

HHS’ Healthcare Cybersecurity and Communications Integration Center (HCCIC) is a critical step toward improving healthcare cybersecurity and will also augment the Department of Homeland Security’s own National Cybersecurity and Communications...

DirectTrust Sees 15% PHI Sharing Increase for Q2 2017

by

There has been a continued increase in the number of organizations utilizing PHI sharing through Direct exchange, with a 15 percent increase in the number of trusted Direct addresses able to share PHI, according to a DirectTrust statement. The...

FTC Blogs Review Data Security, Data Breach Prevention Basics

by

The FTC has started a blog series to help organizations better understand the agency’s approach to data security, and to ensure that entities in numerous sectors can create strong data prevention measures. Starting with the FTC’s...

NICE Cybersecurity Workforce Framework Focuses on Education

by

The National Initiative for Cybersecurity Education (NICE) released a Cybersecurity Workforce Framework to help organizations in various sectors educate and train staff members in needed cybersecurity measures. Entities will also have guidance...

What Are Critical Considerations in Risk Management?

by

Healthcare risk management is an increasingly critical area as cybersecurity threats continue to evolve. Regardless of an organization’s size, it needs to ensure that the right policies, procedures, and tools are in place so staff members...

PHI of 4.7K Ohio Patients Affected by Unauthorized EHR Access

by

  The Daniel Drake Center for Post-Acute Care (DDC) at UC Health recently suffered an instance of unauthorized EHR access, potentially affecting patient PHI security. On June 2, 2017, the UC Health Privacy Office learned that an employee...

HIMSS: Medical Device Security, Data Breaches Top Concerns

by

Healthcare security professionals are mainly concerned with medical device security, patient safety, and data breaches, according to the 2017 HIMSS Cybersecurity survey. More healthcare organizations are working toward their cybersecurity programs,...

Focusing on Employee Training for Stronger Health IT Security

by

The American Hospital Association’s Hospital & Health Networks (H&HN) Most Wired rankings were released earlier this summer, and showed that providers are making great strides in their health IT security. Providers are...

Federal Appeals Court Overturns CareFirst Data Breach Ruling

by

A Federal appeals court reversed a previous ruling over the CareFirst data breach that took place in 2015 and impacted 1.1 million current and former CareFirst members. The US Court of Appeals for the District of Columbia Circuit said “the...

Patient Privacy Included in Recent Opioid Records Senate Bill

by

Recently passed legislation states that HHS will establish guidelines for when healthcare providers should prominently display a patient’s history of opioid use on his or her medical record. The bill also underlines the importance of maintaining...

DHS, Siemens Warn of Potential Medical Device Vulnerabilities

by

Possible medical device vulnerabilities, specifically within medical imaging products, have been identified, according to an advisory from the Department of Homeland Security’s (DHS) Industrial Control Systems Cyber Emergency Response Team...

OPM Data Breach Controls Improved, Further Action Required

by

The Office of Personnel Management (OPM) has made improvements in its data security, but a Government Accountability Office (GAO) report still outlined several areas where OPM data breach controls can be strengthened. The 2015 OPM data breaches...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks