Healthcare Information Security

Cloud Security

How HIPAA affects healthcare cloud computing decisions

by David Canellos

HIPAA covered entities as well as many of their business associate (BA) service providers, including cloud service providers, were bound to the HIPAA Omnibus Rule on Sept. 23, 2013. Part of the reason for the HIPAA Omnibus Rule was to...

Healthcare cloud security: Staying current with BAAs, SLAs

by Patrick Ouellette

BOSTON – No healthcare privacy and security discussion would be complete with the mention of cloud computing and last week’s HIMSS Privacy and Security Forum didn’t disappoint. The “Managing Security Risks of Health Data in...

Military Health System study analyzes privacy challenges

by Patrick Ouellette

BOSTON – Considering the privacy issues with the Veterans Affairs (VA) recently, military health data privacy has been a hot-button issue in the healthcare sector lately. It seems as though the Military Health System concurs with the...

LinkedIn members discuss HIPAA compliance standards, meaning

by Patrick Ouellette

“HIPAA compliance” remains a polarizing term that can be interpreted in many different ways. Last week, HealthITSecurity.com weighed the way vendors make HIPAA compliant claims versus organizations themselves becoming compliant based...

Verifying the specifics of a HIPAA-compliant product

by Patrick Ouellette

Should vendors that say their products and services are “HIPAA compliant” also have a “Buyer Beware” sticker attached for healthcare organizations? Every other healthcare IT security-related press release adds that the product is...

Interpreting HIPAA compliance for PHI in a cloud environment

by Patrick Ouellette

The Center for Democracy and Technology (CDT) recently explored the ways in which HIPAA and cloud computing interconnect for organizations involved with  in a FAQ. From the perspective of a healthcare organization that’s a covered...

Does cloud computing threaten patient privacy, data security?

by Jennifer Bresnick

The rise of cloud computing has created a host of new challenges for patient privacy and data security, according to two Seton Hall School of Law professors.  In a white paper released last month, Frank Pasquale and Tara Adams Ragone...

Making sense of BYOD policy trends for healthcare

by Patrick Ouellette

A survey released by Acronis and the Ponemon Institute last week titled “2013 Data Protection Trends Research” analyzed the risks organizations across the country take in either having shoddy BYOD policies in place or, even worse,...

Larry Ponemon on securing regulated data in healthcare: Q&A

by Patrick Ouellette

Though mobile applications that share files through the cloud such as Box and DropBox can be appealing to consumers, the Ponemon Institute has found that these types of applications can be unsafe in a clinical environment. Ponemon released...

Secure healthcare cloud load-balancing: Time to go virtual

by Bill Kleyman

The modern healthcare environment now spans multiple networks, multiple locations – all across the country. Healthcare data centers are being created to house more data and a lot more users. In some cases, these data centers are...

Tying together healthcare public and private cloud security

by Patrick Ouellette

The amount of attention paid to the differences in securing public and private clouds has dissipated over time to the point now where, though they do have their variances, many of the same security practices can be applied to both public...

How does cloud computing factor into health data breaches?

by Patrick Ouellette

When discussing healthcare data breaches related to cloud computing, much of the conversation seems to be in the future tense. Though many organizations are beginning to become comfortable with putting data and even protected health...

Cloud security best practices for healthcare providers, vendors

by Kurt Hagerman

Patient privacy has always been a top concern for healthcare providers. Ensuring the confidentiality, integrity and availability of sensitive data is critical, both to provide excellent patient care and to protect healthcare organizations...

Healthcare providers digging deep into cloud encryption

by Patrick Ouellette

The standard “we encrypt all of our data” line simply won’t cut it anymore in a healthcare industry that’s riddled with data breaches and massive fines, as evidenced by today’s Office for Civil Rights (OCR) announcement that it...

User cloud mobility creates new healthcare security options

by Bill Kleyman

One of the hottest topics between among healthcare IT managers is the BYOD management technology. After a few iterations of various solutions that have already hit the market – the mobile security management conversation has evolved...

Making healthcare cloud data security decisions as a BA

by Patrick Ouellette

When the HIPAA omnibus rules were announced in January, many of those in the healthcare industry spoke about how heighten responsibilities for HIPAA covered entities, business associates (BAs) and subcontractors would affect healthcare...

Securing the health public and private cloud platform bridge

by Bill Kleyman

Cloud computing has allowed many different healthcare organizations to scale, become more resilient and better service their staff and patients. As healthcare environments become more and more distributed, the need to expand a cloud...

Scrutinizing healthcare data encryption options

by Patrick Ouellette

Decisions on encryption for healthcare organizations are growing increasingly more important as HIPAA penalties become stiffer and some organizations have outdated, preconceived notions of the technology options. Wired recently came out...

HIPAA-compliant hosting considerations for covered entities

by Patrick Ouellette

Cloud computing technology options continues to grow in number by the day for healthcare organizations and discerning what the best products and services are can be challenging. But regardless of what type of cloud technology an...

Healthcare data vulnerability concerns: Mobile and cloud

by Patrick Ouellette

ID Experts, an IT services vendor that offers customers assistance with security and compliance projects, released a list of 10 data breach vulnerabilities today. While the items mainly revolve around what the experts considered general...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy


no, thanks

Continue to site...