Healthcare Information Security

Healthcare Network Security

Healthcare Data Encryption Used by Half of US Organizations

May 15, 2018 - Around 50 percent of US healthcare IT pros said their organizations are investing in healthcare data encryption to protect sensitive data, according to a recent survey by network management and security company Infoblox. Encryption of PHI is not required by HIPAA but is encouraged as an “addressable implementation specification” for protecting PHI, if the covered entity considers...


More Articles

Creating Strong Healthcare Data Security, Positive User Experience

by Bill Kleyman

I was working with a healthcare organization recently and were discussing some new data security initiatives around remote, mobile, and local users. We had a few teams in the room with us. The end-user compute (EUC) team focused on application...

Securing IoT Devices in the Increasingly Connected Hospital System

by Bill Kleyman

As a millennial, I love working with a connected hospital system. I can chat with my doctors through my phone, I can track my own information when I’m doing a visit, and I can even show my doctor some health stats from my fitness monitors....

NH-ISAC, Anomali Partner to Improve Secure Healthcare Data Sharing

by Elizabeth Snell

Having a more seamless secure healthcare data sharing process is at the driving factor behind the National Health Information Sharing and Analysis Center (NH-ISAC) and Anomali recently partnering together. The organizations want to...

134K Possibly Affected in St. Peter’s Server Data Breach

by Elizabeth Snell

An unauthorized third party gained access to St. Peter’s Surgery & Endoscopy Center (the Center) servers on January 8, 2018, according to an online statement. The potential data breach was discovered on the same day of the infiltration,...

Achieving Healthcare Compliance, Security in Provider Settings

by Elizabeth Snell

Providers need to maintain healthcare compliance and ensure their data security measures are strong enough to combat ever-evolving threats. However, compliance and security are not interchangeable and entities must focus on both for comprehensive...

4 Tips to Locking Down, Securing Healthcare BYOD

by Bill Kleyman

We are a connected world. Furthermore, our level of connectedness will only continue to increase. And, this is becoming even more so the case when we look at healthcare. A recent CITO Research study showed that leveraging apps and mobile tools...

Avoiding 5 Common Healthcare Data Security Holes in 2018

by Bill Kleyman

Healthcare data security is an ever-evolving engine, oftentimes struggling to keep up with the demands of the digital world. However, as fast as healthcare IT keeps moving forward, security must absolutely be at the forefront. Breaches are becoming...

OIG: NC Medicaid Eligibility Data Security Measures Must Improve

by Elizabeth Snell

The North Carolina State Medicaid agency (State agency) failed to meet federal requirements for Medicaid eligibility data security, according to an Office of Inspector General (OIG) report. The State agency had the Office of North Carolina Families...

Healthcare Cybersecurity Top Digital Priority for Org Leaders

by Elizabeth Snell

The majority of health systems plan to increase technology spending to improve their healthcare cybersecurity measures next year, according to a survey conducted by the Pittsburgh-based Center for Connected Medicine (CCM), in partnership...

Healthcare Identity, Access Management Center of Imprivata Deal

by Elizabeth Snell

Imprivata recently acquired the Identity and Access Management Business of Caradigm, according to a press release. The move should help healthcare identity and access management specifically, with a focus on reducing security risks and operational...

Why Open Source Security Matters for Healthcare Orgs

by Elizabeth Snell

Open source software can help healthcare organizations remain flexible as they adopt new IT solutions, but if entities lack open source security measures it can lead to larger cybersecurity issues. A recent survey found that organizations in...

US-CERT Urges Updates to Counter Found WiFi Vulnerabilities

by Elizabeth Snell

WiFi Protected Access II (WPA2) handshake traffic could potentially be manipulated by attackers within range of vulnerable devices, according to recent research. The WiFi vulnerabilities could lead to malicious users gaining access to passwords,...

Improving Efficiency with Healthcare Data Center Infrastructure

by Bill Kleyman

There have been some big advancements when it comes to data center infrastructure design and architecture. Cloud computing, converged infrastructure, and network advancements have all contributed to greater levels of density and efficiency. In...

Using SD-WAN in Telemedicine Capabilities, Network Security

by Bill Kleyman

There a lot of great conversations going on with a clear focus on technology and new ways to deliver amazing healthcare services and provide strong network security.  During the recent Value-Based Care Summit in Chicago, I got the chance...

3 Top Tips for Migrating, Upgrading Healthcare Data Security

by Bill Kleyman

It goes without saying that the modern healthcare organization absolutely revolves around its own data security capabilities. How well is PHI data being secured? How well are you pushing out critical updates? How are users accessing your data...

Best Practices for SQL Server Deployment in Healthcare

by Bill Kleyman

I don’t want to spend too much time on a lengthy introduction; the topic around SQL server deployment and healthcare security is very important to cover. However, consider the fact that 2015 and 2016 were pretty awful years when it comes...

OCR Urges End-to-End Security, Verified HTTPS to Protect PHI

by Elizabeth Snell

Implementing end-to-end connection security on internet transactions using Secure Hypertext Transport Protocol (HTTPS) can help healthcare organizations better protect PHI and even detect malware, according to OCR’s latest cybersecurity...

Why Healthcare Network Security is a Critical Provider Tool

by Elizabeth Snell

Covered entities are quickly implementing more technology into daily operations, which could potentially open the door for cyber criminals or even unauthorized insider access. Healthcare network security measures must be current and comprehensive,...

NIST Vulnerable Software Guide May Affect Health Data Security

by Elizabeth Snell

A collection of strategies for reducing software vulnerabilities could potentially affect healthcare organizations that are looking to improve their health data security measures. National Institute of Standards and Technology (NIST) computer...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks