Healthcare Information Security

HIPAA Technical Safeguards

How to Implement Strong HIPAA Technical Safeguards

by Elizabeth Snell

Having strong HIPAA technical safeguards is essential for healthcare organizations of all sizes. However, it is also critical that those safeguards are not the only data security measure that covered entities rely on to keep data protected. Jeffrey...

A Review of Common HIPAA Technical Safeguards

by Elizabeth Snell

HIPAA technical safeguards are just one piece of the larger health data security plan that covered entities and their business associates must put together. However, it is a very important aspect. Over the next few weeks,

Software Update Causes PHI Exposure for Blue Shield of Calif.

by Elizabeth Snell

Blue Shield of California is notifying patients that a recent software update led to potential PHI exposure. Faulty code on the company’s website for group health benefit plan administrators and brokers led to an unauthorized disclosure...

Why HIPAA Technical Safeguards Alone Are Not Enough

by Elizabeth Snell

HIPAA technical safeguards are an important part of any covered entity or business associate’s data security plan. However, that security measure by itself is not enough to ensure that a health data breach will never occur, according to...

Healthcare Data Breaches Stem From Break-in, Phishing, Fraud

by Elizabeth Snell

Preventing healthcare data breaches requires organizations to take numerous factors into account, and ensure that their administrative, physical, and technical safeguards are all working with one another. One lost document, one employee falling...

Phishing Scams: HIPAA Technical or Administrative Safeguard?

by Elizabeth Snell

Phishing scams are not a new threat to the healthcare industry, but as other data security threats have evolved over time, so have phishing approaches. Early on, individuals might have gotten emails from someone claiming to be a prince from a...

Healthcare Authentication Factors: Breaking Down HIPAA

by Elizabeth Snell

Strong technical safeguards are essential for covered entities, regardless of their size, and the right healthcare authentication factors are a critical aspect of those safeguards. Locking down end users, and maintaining technical safeguards...

How Healthcare Malware Attacks are Evolving

by Elizabeth Snell

Healthcare malware attacks are evolving, which is why it is essential for facilities to keep current security measures. As the healthcare industry continues to adopt and implement new technologies, it is essential that facilities also keep their...

Cybersecurity is 2015 Top Health Technology Hazard

by Elizabeth Snell

Cybersecurity is one of the top 10 health technology hazards for 2015, according to a recent ECRI Institute report. Cybersecurity should be a top priority for healthcare organizations, especially with more facilities implementing EHRs and connecting...

VA Cybersecurity Woes Continue, 16 Consecutive Audit Fails

by Elizabeth Snell

The VA once again failed its annual cybersecurity audit. For the 16th consecutive year, the Department of Veterans Affairs failed its annual cybersecurity audit. The investigation sought to find out if the agency was in compliance with the Federal...

Creating Healthcare Security with Special Purpose Networks

by Eric Abbott

With 69 percent of healthcare providers using mobile devices to view patient information, having a high-quality and secure, yet transparent wireless network within a healthcare organization (HCO) is indispensable. And, with the shift to outcomes-based...

Does Healthcare Security Interfere with Clinical Workflow?

by Dustin Lake

Clinical workflows – an established process in a clinician’s daily activity of caring for patients – are increasingly integrating with healthcare information systems, and therefore, healthcare security.  The nation’s...

Why Healthcare Providers Should Consider Data Encryption

by Elizabeth Snell

Healthcare Data Encryption is a crucial tool for providers as they implement BYOD policies and work to strengthen their EHR systems. Healthcare data encryption is becoming an increasingly hot topic, especially as more providers implement EHRs...

HIPAA Technical Safeguards: A Basic Review

by Elizabeth Snell

It’s critical to review the requirements of HIPAA technical safeguards to ensure that your healthcare organization is compliant and able to keep PHI safe. While no healthcare organization can guarantee that a data breach will never take...

Potential Health Data Breach Hits Dermatology Facility

by Elizabeth Snell

Central Dermatology Center is facing a possible health data breach after finding malware was uploaded into one of its computer servers. A North Carolina dermatology center is working through the aftermath of a potential health data breach after...

How Health Data Security Benefits from Industry Sharing

by Elizabeth Snell

Health data security is not a new issue in the healthcare sector, but with health information exchanges (HIEs) springing up all over the country, facilities have to be aware of systems other than their own. In order to ensure that patient data...

Touchstone Medical Imaging Posts Data Breach Notification

by Patrick Ouellette

Touchstone Medical Imaging, LLC has sent out notices to some patients treated prior to August of 2012 that it learned on May 9, 2014 that a shared folder holding sensitive data was exposed on the internet. The imaging specialist organization...

Cedars-Sinai Data Breach Update: 33,000 Patients Affected

by Patrick Ouellette

The Cedars-Sinai Medical Center in Los Angeles announced an unencrypted laptop theft that compromised at least more than 500 patients’ data in August, but actual number of affected patients was unknown. The Los Angeles Times recently reported...

Report: rollout lacked CMS accountability

by Patrick Ouellette

More details surrounding the Centers for Medicare and Medicaid Services (CMS) hurried launch last fall are emerging. The most recent, Rep. Darrell Issa’s (R-Calif.) “Behind the Curtain of the Rollout,”...

GAO: CMS must boost privacy and security controls

by Patrick Ouellette

According to the U.S. Government Accountability Office (GAO), the Centers for Medicare and Medicaid Services (CMS) has made strides in addressing privacy and security controls, there is still work to be done to mitigate risks....


SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
Data Breaches

Our privacy policy

no, thanks