Healthcare Information Security

Infrastructure Security

How Automation Aids Data Security, Improves Patient Satisfaction

November 27, 2017 - Want to know a common trend I’ve seen in pretty much every single healthcare customer I’ve worked with? Data. And I mean a lot of data. Healthcare organizations are producing vast amounts of data from a variety of points. Furthermore, they’re working on turning that data into usable information. For example, patient satisfaction data helps organizations understand what they’re...


More Articles

Evolving Cybersecurity Threats, Protecting Data Top HHS Challenges

by Elizabeth Snell

Adequately addressing the industry’s current cybersecurity threats is a key aspect to one of the major management and performance challenges for HHS, the Office of Inspector General determined in its annual report. OIG’s 2017 Top...

3 Ways All-Flash Could Benefit Your Healthcare Data Security

by Bill Kleyman

Working with healthcare data security over the past couple of years has been really interesting. First of all, we’re seeing a bit of a redesign happening around efficiency, user optimization, and improved systems that are capable of delivering...

Focusing on Healthcare IoT Security with Expanding Market

by Elizabeth Snell

The Internet of Things (IoT) is quickly becoming a more attractive option to organizations across sectors, but IoT security, standards, interoperability, and cost are still key concerns for executives, a recent report found. Verizon’s State...

Improving Efficiency with Healthcare Data Center Infrastructure

by Bill Kleyman

There have been some big advancements when it comes to data center infrastructure design and architecture. Cloud computing, converged infrastructure, and network advancements have all contributed to greater levels of density and efficiency. In...

Transforming How Employees Approach Healthcare Data Security

by Bill Kleyman

Some of the biggest trends in today’s healthcare world revolve some form of digital revolution, including in healthcare data security. What’s really amazing about this is that almost every initiative is unique to the requirements...

Recent Executive Order to Strengthen Federal Cybersecurity

by Elizabeth Snell

Improving federal cybersecurity, specifically in the nation’s networks and infrastructure settings, is the key focus in a recent executive order President Trump signed earlier this week. Federal network cybersecurity must be improved in...

IT Security Workers Expect IoT Cybersecurity Attack Increase

by Elizabeth Snell

As more industries, including healthcare, continue to implement connected devices in critical infrastructure segments, there will likely be an increase in Industrial Internet of Things (IIoT) cybersecurity attacks, according to a recent Tripwire...

National Cybersecurity Strategy Suggested in New Report

by Elizabeth Snell

Improving cyber hygiene and working to reduce and control cyber crime are just two of the cybersecurity strategy recommendations from the Center for Strategic and International Studies (CSIS) in its recent Cyber Policy Task Force report. CSIS...

What Should Entities Expect for Healthcare Security in 2017?

by Bill Kleyman

We can spend the entirety of this article discussing all of the breaches, security holes, and data loss that happened within healthcare this year alone. There are plenty of examples around encryption, physical device loss, lost user accounts,...

Study Finds Cyberthreat Data Overwhelming to Security Workers

by Elizabeth Snell

While more organizations are likely looking for the best options to combat evolving cybersecurity threats, a recent study found that the majority of security professionals are overwhelmed by the amount of cyberthreat data that they receive. An...

Creating Strong Healthcare IT Infrastructure Security

by Bill Kleyman

Security in the healthcare world continues to be a very interesting topic. We’re seeing growing concerns around data, virtual systems, and much more adoption around cloud services. At the healthcare level, new types of services are impacting...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks