Healthcare Information Security

Health IT Security and HIPAA News

Transforming How Employees Approach Healthcare Data Security

by

Some of the biggest trends in today’s healthcare world revolve some form of digital revolution, including in healthcare data security. What’s really amazing about this is that almost every initiative is unique to the requirements...

AHIMA Focuses on HIPAA Compliance in New Patient Data Form

by

AHIMA released a new form that streamlines the patient data request process and also maintains HIPAA compliance. Patient have the right to request access to their own information under HIPAA regulations, but are sometimes confused about the process....

NIST Cybersecurity Included in Latest HITRUST CSF Version

by

Version 9 of the HITRUST CSF will be released in August 2017 and is set to address the NIST Cybersecurity Framework requirements as well, according to a HISTRUST statement. A single assessment will include the necessary controls to address the...

CA Supreme Court Rejects Physician Patient Privacy Claim

by

A California physician’s claim that the state medical board committed patient privacy violations when it obtained an individual’s prescription records without a warrant was recently rejected by the California Supreme Court. The medical...

Patient Data Exposure Possibly Impacts 15K at FL Center

by

On May 5, 2017, Tampa Bay Surgery Center was made aware of a security incident in which certain patient data was posted to a public online file-sharing site by an unauthorized third party. Law enforcement informed the healthcare center that the...

Hacking Continues to Cause Majority of Reported Data Breaches

by

Through June 2017 there has been a 29 percent increase from 2016 in US reported data breaches, according to a report from the Identity Theft Resource Center (ITRC) and CyberScout. Overall, the number of breaches could hit a 37 percent annual...

ONC Stresses Improved Patient Data Access Measures

by

Healthcare organizations need to improve their processes for patient data access measures, as this will reduce consumer burden and also help entities coordinate better care, according to an ONC report. ONC explained in Improving the Health Records...

Top 3 Essentials in Preparing for Ransomware Attacks

by

With each week seeming to bring in a report of a new ransomware attack, healthcare organizations cannot afford to assume that this type of cybersecurity issue will never affect them. Preparing for ransomware attacks in the healthcare industry...

Patient Safety Critical Part of Healthcare Information Security

by

Healthcare data breaches, denial of service (DoS) attacks, and ransomware attacks are a few of the potential threats to healthcare information security that could impact patient safety, according to a report published in The New England Journal...

Applying Healthcare Information Sharing to Data Security

by

As cybersecurity threats continue to evolve, healthcare information sharing can be a boon to organizations of all sizes. Industry stakeholders can learn best practices, and see how others in the sector are working to prevent data security issues....

Using SD-WAN in Telemedicine Capabilities, Network Security

by

There a lot of great conversations going on with a clear focus on technology and new ways to deliver amazing healthcare services and provide strong network security.  During the recent Value-Based Care Summit in Chicago, I got the chance...

Calif. Patient Data Sharing Guidance Aids Mental Health Care

by

Recently announced authoritative but non-binding patient data sharing guidance could potentially aid behavioral healthcare providers in safely sharing substance use disorder and mental health patient records. The California Office of Health Information...

Secure Messaging Key Focal Point for Most Wired Hospitals

by

Smart phones are becoming increasingly critical aspects for healthcare providers, with the American Hospital Association’s Hospital & Health Networks (H&HN) Most Wired rankings showing secure messaging a key tool for patients and...

95% of Healthcare Orgs Not Utilizing Risk Management Software

by

Healthcare organizations continue to prioritize PHI security, but often have limited resources – such as access to risk management software – according to a recent Netwrix survey. Nearly all surveyed entities – 95 percent –...

UC Davis Health System Phishing Attack Potentially Impacts 15K

by

On May 15, 2017, UC Davis Health suffered a potential security breach when a phishing email was sent to an employee. Through the phishing email, hackers gained access to the employee’s account and posed as the account owner to send emails...

Medical Record Security Key Focus in Indiana Senate Bill

by

Database owners are now required to ensure medical record security by safeguarding healthcare data stored in their systems, according to a recently updated Indiana bill. Senate Bill 549 changed the definition of “abandoned” medical...

3 Top Tips for Migrating, Upgrading Healthcare Data Security

by

It goes without saying that the modern healthcare organization absolutely revolves around its own data security capabilities. How well is PHI data being secured? How well are you pushing out critical updates? How are users accessing your data...

DHS Updates on Federal Network Cybersecurity, Infrastructure

by

The Department of Homeland Security’s (DHS) United States Computer Emergency Readiness Team (US-CERT) recently posted updates on federal network cybersecurity measures, along with current steps being taken to strengthen infrastructure...

NIST Funding Can Strengthen National Cybersecurity Efforts

by

An increase in National Institute of Standards and Technology (NIST) funding for fiscal year 2018 will help support critical public-private efforts to strengthen national cybersecurity, according to HIMSS and other industry stakeholders. HIMSS...

Creating a Healthcare Security Incident Reporting Process

by

With the recent wave of ransomware attacks, hacking attempts, and unauthorized disclosures, healthcare organizations have more opportunities to exercise their incident management plans. Unfortunately, these same organizations are learning the...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks