Healthcare Information Security

Healthcare Data Security

Survey Finds Lax Patching Practices Feed Healthcare Data Breaches

by Fred Donovan

Patching vulnerabilities in your systems and applications is one of the most important steps you can take to prevent a healthcare data breach at your organization. Yet, a majority of security professionals in the healthcare and...

CareFirst BlueCross BlueShield Fesses Up to Phishing Attack

by Fred Donovan

Baltimore-based CareFirst BlueCross BlueShield admitted March 30, 2018 that the personal data of 6,800 CareFirst members may have been exposed by a phishing attack that compromised an employee’s email account. Information that could...

Creating Strong Healthcare Data Security, Positive User Experience

by Bill Kleyman

I was working with a healthcare organization recently and were discussing some new data security initiatives around remote, mobile, and local users. We had a few teams in the room with us. The end-user compute (EUC) team focused on...

Threat Intelligence Sharing Essential for Healthcare Cybersecurity

by Elizabeth Snell

The National Health Information Sharing and Analysis Center (NH-ISAC) constantly stresses the need for threat intelligence sharing in the healthcare sector, especially as cybersecurity threats grow increasingly...

OIG Compliance Audit Finds HHS Risk Management, IAM Issues Continue

by Elizabeth Snell

The enterprise-wide information security program within the Department of Health and Human Services (HHS) has improved, but there are still risk management weaknesses, issues with identity and access management (IAM), and problems in other...

Healthcare Data Privacy, Security Concerns Hinder Digital Adoption

by Elizabeth Snell

Healthcare data privacy and security concerns are pushing healthcare payers and providers to reconsider whether or not they want to adopt mobile and digital health tools, according to the 8th Annual Industry Pulse Report from Change...

How Compliance, Data Security Needs Shift with Big Data Push

by Elizabeth Snell

Numerous companies are working to evolve their database ecosystems through cloud and big data initiatives, and are subsequently facing an increasing number of compliance and data security needs. Recent research found though that not many...

Data Security Cited in ONC Health Data Exchange Framework Praise

by Elizabeth Snell

ONC’s Trusted Exchange Framework and Common Agreement (TEFCA) draft has so far been met with industry support, with organizations lauding ONC in working to strengthen trust and support for nationwide interoperability while also...

Why Privileged Account Management Matters in Health Data Security

by Elizabeth Snell

As healthcare providers continue to work toward creating strong cybersecurity measures, it is important to remember that insider access could also lead to a potential data breach. Failing to secure privileged accounts could lead to...

Healthcare Endpoint Attacks Cost the Industry $1.3B Annually

by Elizabeth Snell

Preparing for potential healthcare endpoint attacks should be a top priority for covered entities, especially with a recent survey showing that organizations believe that an over-reliance on traditional endpoint security is leaving...

Health IT Security, FHIR Focus of ONC Secure API Server Challenge

by Elizabeth Snell

ONC is challenging healthcare stakeholders to build secure Fast Healthcare Interoperability Resources (FHIR) servers to improve health IT security and ensure that secure FHIR options are available in the future. The Secure API Server...

Focusing on Healthcare IoT Security with Expanding Market

by Elizabeth Snell

The Internet of Things (IoT) is quickly becoming a more attractive option to organizations across sectors, but IoT security, standards, interoperability, and cost are still key concerns for executives, a recent report...

Using Threat Intelligence to Improve Healthcare Cybersecurity

by Elizabeth Snell

While 84 percent of organizations consider threat intelligence “essential to a strong security posture,” entities admit that the large amount of threat data and a lack of staff expertise lower their threat program...

FTC Blogs Review Data Security, Data Breach Prevention Basics

by Elizabeth Snell

The FTC has started a blog series to help organizations better understand the agency’s approach to data security, and to ensure that entities in numerous sectors can create strong data prevention measures. Starting with the...

Transforming How Employees Approach Healthcare Data Security

by Bill Kleyman

Some of the biggest trends in today’s healthcare world revolve some form of digital revolution, including in healthcare data security. What’s really amazing about this is that almost every initiative is unique to the...

Shifting the Corporate Focus to Healthcare Data Security

by Bill Kleyman

Healthcare environments continue to change and evolve within today’s digital environment. In fact, many healthcare shops are working extra hard to align with a new, “digitally native” user. We’re seeing things like...

FTC Data Security Enforcement Standard Center in LabMD Case

by Elizabeth Snell

The US Court of Appeals for the Eleventh District listened to oral arguments last week in the case of LabMD, Inc. versus the Federal Trade Commission (FTC). The Court must determine if the FTC overstepped its authority with its data...

OIG Notes Va. Medicaid Information Security Vulnerabilities

by Elizabeth Snell

An Office of Inspector General (OIG) audit found the Virginia Medicaid Management Information System (MMIS) to have information security vulnerabilities. “Virginia did not adequately secure its Medicaid data and information systems,...

More Orgs Seeking Staff for Healthcare Privacy, Security Jobs

by Elizabeth Snell

There was a large increase in healthcare privacy and security job postings, indicating that the health information management (HIM) profession is continuing to evolve with the needs of healthcare organizations, according to a recent...

OCR Urges End-to-End Security, Verified HTTPS to Protect PHI

by Elizabeth Snell

Implementing end-to-end connection security on internet transactions using Secure Hypertext Transport Protocol (HTTPS) can help healthcare organizations better protect PHI and even detect malware, according to OCR’s latest...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy


no, thanks

Continue to site...