Healthcare Information Security

Healthcare Network Security

134K Possibly Affected in St. Peter’s Server Data Breach

March 13, 2018 - An unauthorized third party gained access to St. Peter’s Surgery & Endoscopy Center (the Center) servers on January 8, 2018, according to an online statement. The potential data breach was discovered on the same day of the infiltration, the Center said.   The incident “did not involve or affect any staff, servers or information at St. Peter’s Hospital, Albany Gastroenterology...

More Articles

Achieving Healthcare Compliance, Security in Provider Settings

by Elizabeth Snell

Providers need to maintain healthcare compliance and ensure their data security measures are strong enough to combat ever-evolving threats. However, compliance and security are not interchangeable and entities must focus on both for comprehensive...

4 Tips to Locking Down, Securing Healthcare BYOD

by Bill Kleyman

We are a connected world. Furthermore, our level of connectedness will only continue to increase. And, this is becoming even more so the case when we look at healthcare. A recent CITO Research study showed that leveraging apps and mobile tools...

Avoiding 5 Common Healthcare Data Security Holes in 2018

by Bill Kleyman

Healthcare data security is an ever-evolving engine, oftentimes struggling to keep up with the demands of the digital world. However, as fast as healthcare IT keeps moving forward, security must absolutely be at the forefront. Breaches are becoming...

OIG: NC Medicaid Eligibility Data Security Measures Must Improve

by Elizabeth Snell

The North Carolina State Medicaid agency (State agency) failed to meet federal requirements for Medicaid eligibility data security, according to an Office of Inspector General (OIG) report. The State agency had the Office of North Carolina Families...

Healthcare Cybersecurity Top Digital Priority for Org Leaders

by Elizabeth Snell

The majority of health systems plan to increase technology spending to improve their healthcare cybersecurity measures next year, according to a survey conducted by the Pittsburgh-based Center for Connected Medicine (CCM), in partnership...

Healthcare Identity, Access Management Center of Imprivata Deal

by Elizabeth Snell

Imprivata recently acquired the Identity and Access Management Business of Caradigm, according to a press release. The move should help healthcare identity and access management specifically, with a focus on reducing security risks and operational...

Why Open Source Security Matters for Healthcare Orgs

by Elizabeth Snell

Open source software can help healthcare organizations remain flexible as they adopt new IT solutions, but if entities lack open source security measures it can lead to larger cybersecurity issues. A recent survey found that organizations in...

US-CERT Urges Updates to Counter Found WiFi Vulnerabilities

by Elizabeth Snell

WiFi Protected Access II (WPA2) handshake traffic could potentially be manipulated by attackers within range of vulnerable devices, according to recent research. The WiFi vulnerabilities could lead to malicious users gaining access to passwords,...

Improving Efficiency with Healthcare Data Center Infrastructure

by Bill Kleyman

There have been some big advancements when it comes to data center infrastructure design and architecture. Cloud computing, converged infrastructure, and network advancements have all contributed to greater levels of density and efficiency. In...

Using SD-WAN in Telemedicine Capabilities, Network Security

by Bill Kleyman

There a lot of great conversations going on with a clear focus on technology and new ways to deliver amazing healthcare services and provide strong network security.  During the recent Value-Based Care Summit in Chicago, I got the chance...

3 Top Tips for Migrating, Upgrading Healthcare Data Security

by Bill Kleyman

It goes without saying that the modern healthcare organization absolutely revolves around its own data security capabilities. How well is PHI data being secured? How well are you pushing out critical updates? How are users accessing your data...

Best Practices for SQL Server Deployment in Healthcare

by Bill Kleyman

I don’t want to spend too much time on a lengthy introduction; the topic around SQL server deployment and healthcare security is very important to cover. However, consider the fact that 2015 and 2016 were pretty awful years when it comes...

OCR Urges End-to-End Security, Verified HTTPS to Protect PHI

by Elizabeth Snell

Implementing end-to-end connection security on internet transactions using Secure Hypertext Transport Protocol (HTTPS) can help healthcare organizations better protect PHI and even detect malware, according to OCR’s latest cybersecurity...

Why Healthcare Network Security is a Critical Provider Tool

by Elizabeth Snell

Covered entities are quickly implementing more technology into daily operations, which could potentially open the door for cyber criminals or even unauthorized insider access. Healthcare network security measures must be current and comprehensive,...

NIST Vulnerable Software Guide May Affect Health Data Security

by Elizabeth Snell

A collection of strategies for reducing software vulnerabilities could potentially affect healthcare organizations that are looking to improve their health data security measures. National Institute of Standards and Technology (NIST) computer...

3 Tips for Creating Healthcare Security Change, Process Controls

by Bill Kleyman

Healthcare and security are probably some of the hottest topics today. We’re seeing medial IoT emerging, more digitizing of the healthcare ecosystem, and more healthcare services specifically using technology to revolutionize patient care....

Understanding Web Application Security in Healthcare

by Bill Kleyman

The modern healthcare environment has evolved to present new types of technology services, support new kinds of users, and deliver even better healthcare services. Cloud-facing applications and EHR systems are becoming the new normal as we support...

Creating Strong Healthcare IT Infrastructure Security

by Bill Kleyman

Security in the healthcare world continues to be a very interesting topic. We’re seeing growing concerns around data, virtual systems, and much more adoption around cloud services. At the healthcare level, new types of services are impacting...

Prevent Data Breaches with Strong Medical Device Security

by Jeff Hussey of Tempered Networks

Patients come to your healthcare facility with a whole host of expectations. They want personalized, quality care delivery. They want strong medical device security, knowing that all equipment is reliable, effective and safe. They’re placing...


SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
Data Breaches

Our privacy policy

no, thanks