Healthcare Information Security

Healthcare Network Security

LabCorp’s Network Security Breach May Have Exposed PHI of Millions

July 17, 2018 - After recently dodging a legal bullet over an alleged HIPAA violation, LabCorp is now facing a network security breach that forced the North Carolina-based laboratory diagnostics firm to shut down its IT network, possibly placing PHI of millions of people at risk. In a July 16 statement, LabCorp said it detected suspicious activity during the weekend of July 14-15 on its IT network. It...


More Articles

Healthcare Data Encryption Used by Half of US Organizations

by Fred Donovan

Around 50 percent of US healthcare IT pros said their organizations are investing in healthcare data encryption to protect sensitive data, according to a recent survey by network management and security company Infoblox. Encryption of PHI...

Creating Strong Healthcare Data Security, Positive User Experience

by Bill Kleyman

I was working with a healthcare organization recently and were discussing some new data security initiatives around remote, mobile, and local users. We had a few teams in the room with us. The end-user compute (EUC) team focused on...

Securing IoT Devices in the Increasingly Connected Hospital System

by Bill Kleyman

As a millennial, I love working with a connected hospital system. I can chat with my doctors through my phone, I can track my own information when I’m doing a visit, and I can even show my doctor some health stats from my fitness...

NH-ISAC, Anomali Partner to Improve Secure Healthcare Data Sharing

by Elizabeth Snell

Having a more seamless secure healthcare data sharing process is at the driving factor behind the National Health Information Sharing and Analysis Center (NH-ISAC) and Anomali recently partnering together. The organizations want...

134K Possibly Affected in St. Peter’s Server Data Breach

by Elizabeth Snell

An unauthorized third party gained access to St. Peter’s Surgery & Endoscopy Center (the Center) servers on January 8, 2018, according to an online statement. The potential data breach was discovered on the same day of the...

Achieving Healthcare Compliance, Security in Provider Settings

by Elizabeth Snell

Providers need to maintain healthcare compliance and ensure their data security measures are strong enough to combat ever-evolving threats. However, compliance and security are not interchangeable and entities must focus on both for...

4 Tips to Locking Down, Securing Healthcare BYOD

by Bill Kleyman

We are a connected world. Furthermore, our level of connectedness will only continue to increase. And, this is becoming even more so the case when we look at healthcare. A recent CITO Research study showed that leveraging apps and mobile...

Avoiding 5 Common Healthcare Data Security Holes in 2018

by Bill Kleyman

Healthcare data security is an ever-evolving engine, oftentimes struggling to keep up with the demands of the digital world. However, as fast as healthcare IT keeps moving forward, security must absolutely be at the forefront. Breaches...

OIG: NC Medicaid Eligibility Data Security Measures Must Improve

by Elizabeth Snell

The North Carolina State Medicaid agency (State agency) failed to meet federal requirements for Medicaid eligibility data security, according to an Office of Inspector General (OIG) report. The State agency had the Office of North...

Healthcare Cybersecurity Top Digital Priority for Org Leaders

by Elizabeth Snell

The majority of health systems plan to increase technology spending to improve their healthcare cybersecurity measures next year, according to a survey conducted by the Pittsburgh-based Center for Connected Medicine (CCM), in...

New WannaCry Malware Strain Affects FirstHealth Computer Network

by Elizabeth Snell

FirstHealth of the Carolinas announced on its website that a new version of the WannaCry malware strain forced the organization to shut down its information system network. A statement posted on October 20, 2017 said that...

Healthcare Identity, Access Management Center of Imprivata Deal

by Elizabeth Snell

Imprivata recently acquired the Identity and Access Management Business of Caradigm, according to a press release. The move should help healthcare identity and access management specifically, with a focus on reducing security risks and...

Why Open Source Security Matters for Healthcare Orgs

by Elizabeth Snell

Open source software can help healthcare organizations remain flexible as they adopt new IT solutions, but if entities lack open source security measures it can lead to larger cybersecurity issues. A recent survey found that organizations...

US-CERT Urges Updates to Counter Found WiFi Vulnerabilities

by Elizabeth Snell

WiFi Protected Access II (WPA2) handshake traffic could potentially be manipulated by attackers within range of vulnerable devices, according to recent research. The WiFi vulnerabilities could lead to malicious users gaining access to...

Improving Efficiency with Healthcare Data Center Infrastructure

by Bill Kleyman

There have been some big advancements when it comes to data center infrastructure design and architecture. Cloud computing, converged infrastructure, and network advancements have all contributed to greater levels of density and...

Using SD-WAN in Telemedicine Capabilities, Network Security

by Bill Kleyman

There a lot of great conversations going on with a clear focus on technology and new ways to deliver amazing healthcare services and provide strong network security.  During the recent Value-Based Care Summit in Chicago, I got the...

3 Top Tips for Migrating, Upgrading Healthcare Data Security

by Bill Kleyman

It goes without saying that the modern healthcare organization absolutely revolves around its own data security capabilities. How well is PHI data being secured? How well are you pushing out critical updates? How are users accessing your...

Best Practices for SQL Server Deployment in Healthcare

by Bill Kleyman

I don’t want to spend too much time on a lengthy introduction; the topic around SQL server deployment and healthcare security is very important to cover. However, consider the fact that 2015 and 2016 were pretty awful years when it...

OCR Urges End-to-End Security, Verified HTTPS to Protect PHI

by Elizabeth Snell

Implementing end-to-end connection security on internet transactions using Secure Hypertext Transport Protocol (HTTPS) can help healthcare organizations better protect PHI and even detect malware, according to OCR’s latest...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy


no, thanks

Continue to site...