How Secure was National Cybersecurity Awareness Month?
Where is the Greatest Health Data Breach Risk for Providers?
Why Data Security is Crucial for mHealth Benefits
Majority of Calif. Health Data Breaches from Stolen Hardware
How WEDI is working to Keep Collaborative Healthcare Secure
PHI ‘Mishandling’ by Montana VA Leads to Possible Data Breach
Best Practices for Creating a Strong Patient Portal
Former HealthCare.gov Official Subpoenaed Over Health Security Issues
How Health Data Security Benefits from Industry Sharing
Will Healthcare Interoperability Issues Follow DeSalvo Departure?
Unencrypted Discs with PHI Create Potential Health Data Breach
HITRUST Common Security Framework: Tips for Healthcare Facilities
Health Data Encryption is Critical Aspect for PHI Security
PHI Encryption Necessary, Says Proposed NJ Bill
How to Stay HIPAA Compliant When Using Your Healthcare Cloud
Potential Health Data Breach, Medical Records Fly off Truck
Why Health IT Security Needs a ‘Lifecycle Process’
DeSalvo Leaves ONC for HHS Role
Why Protecting PHI Must Be Top a Priority for the IRS
Are There Cybersecurity Flaws in Medical Devices?
Potential Health Data Breach, 40,000 Patient Records Stolen
Why Health Data Security Requires Detection and Prevention
One Year after Data Breach, FDA System Still Vulnerable
CMS Updates Security Risk Analysis Procedure
Factoring Security Into Health Data Disclosure Management
PHI Potentially Exposed by Calif. Group with X-Ray Dump
Second Healthcare Data Breach Hits Tenn. Facility, Files Misplaced
HIPAA Business Associate Agreements: What Needs to be Included?
EY Principal: Strong EHR Security Essential for Healthcare
Are Small Healthcare Facilities Prepared for Data Breaches?
Healthcare Data Breach News: Pa. Server Hacked; Records Found Dumped
Fla. Court: HIPAA Not Violated in Malpractice Reform
AMA: MU Secure Messaging Criteria Should Be Optional
HIPAA Best Practices: Acceptable Use Policies, Team Training
Oregon Health Insurance Exchange Suffers 18th Breach
Patient Privacy Notices: What Is Authorized Disclosure?
Key HIPAA Compliance Resources for Healthcare Providers
‘Small Number’ Of Laptops With PHI Missing From Ambulances
eHealth Initiative Survey: HIEs Lacking In Interoperability
Why HIPAA Compliant Secure Messaging Is Crucial For BIDMC
Steps To Address Human Element Of Healthcare Data Security
Laptop With PHI Stolen From Ga. Health Employee’s Car
Healthcare BYOD Adoption: Five Security Considerations
Will New ‘Poodle’ Web Threat Affect Health Data Security?
Patient Files Another Class Action Community Health Systems
CIS, MDISS Collaborate On Medical Device Security Guidance
UC Davis Health Email Breach Exposes 1,326 Patients’ Data
Healthcare CISOs Gaining Importance To The Industry
National Coordinator Names New ONC Chief Privacy Officer
HIMSS Responds To NIST Cybersecurity Framework RFI
Brigham And Women’s ISO Talks FDA, mHealth Device Security
Protecting against Healthcare Data Breaches: Failed Physical Safeguards
Data Breach News: Cone Health Mailing Error; New Calif. Law
ONC HIT Report to Congress Includes Privacy, Security Efforts
South Texas VA Reports Printing Error Patient Data Breach
Alere Home Monitoring Data Breach Class Suit Thrown Out
NIST Mobile App Security Guidelines: Healthcare Key Points
Hospital Biometric Test Pilot Decisions: IT Security Effects
How to Search for Qualified Healthcare IT Security Personnel
HIPAA Privacy Rule: Reminders to Avoid Enforcement Penalties
Will Facebook Interest in Consumer Health Affect Privacy?
HITRUST Cyber Threat XChange Promotes Intelligence Sharing
Touchstone Medical Imaging Posts Data Breach Notification
Applying Healthcare Security Lessons to New Malware Threats
HIPAA Enforcement Takeaways From the OCR, NIST Conference
State Reps Propose HealthCare.gov Patient Privacy Bill
AHIMA Releases Information Governance Principles for Healthcare
Cedars-Sinai Data Breach Update: 33,000 Patients Affected
Balancing Healthcare Cloud Prospects With Security Needs
PwC Survey: Healthcare Industry Increasing Security Spending
FDA Releases Medical Device Cybersecurity Guidance
OCR and NIST Conference Highlights HIPAA Data Breach Statistics
Why Healthcare CISOs Must Prioritize, Organize Threat Data
Reviewing California’s Mobile App, PHR Privacy Regulations
Complete your profile below to access this resource.
Thanks for subscribing to our newsletter. Please fill out the form below to become a member and gain access to our resources.
Enter your email address to receive a link to reset your password
Email Address *
©2012-2017 Xtelligent Media, LLC. All rights reserved. HealthITSecurity.com is published by Xtelligent Media, LLC
SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on