Healthcare Information Security

Health Data Access

Cybersecurity, Access Management Among Top Health IT Risk Areas

December 19, 2018 - Business continuity and disaster recovery, cybersecurity, biomedical devices, IT governance, system access management, and system implementation will be the biggest IT risk areas for healthcare organizations in 2019, according to a report from Crowe, a global public accounting, consulting, and technology firm. Crowe analyzed nearly 3,000 risk areas across 250 healthcare entities to...


More Articles

30 Percent of Online Health Databases Expose Patient Data

by Jessica Davis

About 30 percent of online healthcare databases are left exposed online due to misconfiguration, according to a recent report from IntSights. The researchers scoured the internet to determine how easy it would be for a hacker to access...

HIPAA Privacy Rule Can Be Tool for Health Information Exchange

by Fred Donovan

Rather than being a barrier to information sharing and interoperability, the HIPAA Privacy Rule can be seen as a tool to facilitate health information exchange and flow across the health ecosystem, argued OCR and ONC in an Aug. 30 blog...

OIG: NC Medicaid Eligibility Data Security Measures Must Improve

by Elizabeth Snell

The North Carolina State Medicaid agency (State agency) failed to meet federal requirements for Medicaid eligibility data security, according to an Office of Inspector General (OIG) report. The State agency had the Office of North...

Healthcare Identity, Access Management Center of Imprivata Deal

by Elizabeth Snell

Imprivata recently acquired the Identity and Access Management Business of Caradigm, according to a press release. The move should help healthcare identity and access management specifically, with a focus on reducing security risks and...

Cyberattacks Threaten Thousands of Patient Health Records

by Kate Monica

A part of smaller specialty practices have allegedly suffered cyberattacks at the hands of the same team of hackers.* Editor's note: An earlier version of this article incorrectly described the hacking incidents as ransomware...

3 Critical Steps for Managing Third-Party Access to Your EHR

by Marti Arvin of CynergisTek

Before a hospital grants any kind of network access to users from an outside organization, like a physician’s practice, it must determine to whom access is granted and for how long. It is a complex and essential process. This...

Audit Controls Underlined in $5.5M OCR HIPAA Settlement

by Elizabeth Snell

UPDATE: Memorial Healthcare System sent comments to HealthITSecurity.com on February 17.  Florida-based Memorial Healthcare Systems (MHS) recently agreed to a $5.5 million OCR HIPAA settlement, stemming from incidents that were...

Focusing on Audit Controls to Maintain PHI Security

by Elizabeth Snell

Reviewing and securing audit trails, while also ensuring the proper tools to collect, monitor, and review those audit trails are in place are key audit control considerations for covered entities and business associates, according to the...

Pharmaceutical Leaders Sentenced for HIPAA Violations, Fraud

by Elizabeth Snell

Three former district managers of a pharmaceutical firm have been sentenced for their connection in committing HIPAA violations and healthcare fraud, according to a release from the District of Massachusetts U.S. Attorney’s Office...

FDA Drafts Health Data Sharing Guidance for Medical Devices

by Jacqueline LaPointe

According to recent draft guidance from the Food and Drug Administration (FDA), medical device manufacturers can look to new health data sharing guidelines to help relieve previous patient privacy concerns. “Although not generally...

Most 2016 Healthcare Data Breaches From Unauthorized Access

by Elizabeth Snell

Last year is often referred to as the “Year of the Hack” for healthcare, with the majority of healthcare data breaches being caused by third-party cyber attacks. The top three incidents alone combined to potentially affect...

Organizing, automating access for internal healthcare audits

by Dean Wlech

Last week, we discussed some best practices in granting healthcare user access rights. The next step in the process is to perform an initial audit. Most new healthcare employees are being given correct access rights, but what about...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy


no, thanks

Continue to site...