Healthcare Information Security

Mobile Device Security

More Articles

Smart Wristband Raises Health Data Security, Privacy Concerns

by Fred Donovan

Rutgers University researchers have created a new smart wristband with a biosensor that can count particles in the user’s blood and transmit that data via Bluetooth to a nearby smartphone. While this technology could have a major...

Robust Health Data Security Needed for PHI-Laden Mobile Devices

by Fred Donovan

Strong health data security is vital for electronic media and mobile devices that process and/or store ePHI, stressed OCR in its August 2018 Cyber Security Newsletter. “Anyone with physical access to such devices and media,...

Oklahoma Government in Row Over Alleged HIPAA Violation

by Fred Donovan

Two branches of Oklahoma’s government are embroiled in a controversy over whether the Oklahoma Department of Veterans Affairs committed a HIPAA violation when it allowed VA medical aides to access patient medical records using their...

NIST, NCCoE Publish Guide on Healthcare Mobile Device Security

by Fred Donovan

NIST and the National Cybersecurity Center of Excellence (NCCoE) have released a guide on how providers can improve healthcare mobile device security to better protect PHI. The guidance, Securing Electronic Records on Mobile Devices,...

Smart Kids Thermometer Coughs Up Digital Health Data to Hackers

by Fred Donovan

Ivy Health Kids Thermometer, a smart and portable arm thermometer for babies and small children that connects over Bluetooth to a mobile device app, failed to protect sensitive digital health data of children from hackers, according...

Healthcare Organizations Relying on Passive Mobile Device Security

by Fred Donovan

Half of healthcare organizations rely on passive mobile device security measures such as policy and education, which could leave them vulnerable to attack, according to an annual survey of more than 300 healthcare organizations by...

Healthcare Data Encryption Used by Half of US Organizations

by Fred Donovan

Around 50 percent of US healthcare IT pros said their organizations are investing in healthcare data encryption to protect sensitive data, according to a recent survey by network management and security company Infoblox. Encryption of PHI...

Mobile Device Security Worries Plague Healthcare Providers

by Fred Donovan

Mobile device security is a top concern of healthcare providers when it comes to their mobile programs, according to a survey of 600 healthcare IT decision makers conducted by Vanson Bourne on behalf of mobile device management (MDM)...

Securing IoT Devices in the Increasingly Connected Hospital System

by Bill Kleyman

As a millennial, I love working with a connected hospital system. I can chat with my doctors through my phone, I can track my own information when I’m doing a visit, and I can even show my doctor some health stats from my fitness...

Healthcare Most Likely to Suffer from Lagging Mobile Device Security

by Elizabeth Snell

Organizations across numerous industries are increasingly concerned about potential mobile device security threats, with approximately three-quarters stating that the risks associated with mobile devices have increased in the past year,...

4 Key Ways to Overcome Healthcare BYOD Security Challenges

by Bill Kleyman

Let’s talk about BYOD security and the mobile workforce in the healthcare environment. We’re seeing it happen every single day. Doctors, nurses, and healthcare workers are either bringing in their own devices, or using...

Healthcare Secure Messaging, EHR Integration Top CIO Focal Points

by Elizabeth Snell

Healthcare secure messaging is one of the top focal points for CIOs, with 72 percent reporting that they currently utilize secure texting as part of their mobile strategy, according to a recent survey. Seventy-six percent reported they...

Top Tips for Mobile Device Security, Keeping ePHI Secure

by Elizabeth Snell

More healthcare organizations are utilizing smart phones, laptops, and tablets for daily operations, but failing to include these devices in an enterprise-wide risk analysis could lead to mobile device security issues. Entities need to...

Using Secure Texting for Improved Patient Care, Data Security

by Elizabeth Snell

Implementing new technical solutions, such as secure texting, can help healthcare providers of all sizes and in different locations better care for patients and ensure PHI security. Regardless of where an organization is based though,...

How Mobile Healthcare Users Affect the Industry, Data Security

by Bill Kleyman

We’re seeing a true evolution around mobile devices being brought into the healthcare world. Mobile healthcare users are quickly becoming the norm. As bring your own device (BYOD) programs continue to become more commonplace, 38...

DHS Mobile Device Security Study Urges Federal Improvements

by Elizabeth Snell

A recent Department of Homeland Security (DHS) report on improving the federal government’s approach to mobile device security could also have potential impact on healthcare’s mobile approach. The report is based off of a...

Mobile Security Concerns Continue to Nag Health IT Leaders

by Elizabeth Snell

Healthcare IT decision makers may see the value in implementing mobile options, such as BYOD and mobile device management (MDM) solutions, but there are still mobile security concerns, recent research shows. More than one-quarter of IT...

Secure Texting Rules Clarified in Joint Commission Newsletter

by Elizabeth Snell

Using secure texting for patient care orders is still not acceptable, the Joint Commission explained in its December newsletter. While the Joint Commission had reinstated its ban on the mHealth platform earlier this year, it stated that...

Health Data Privacy Risks Created with Wearable Devices

by Elizabeth Snell

Better standards on health data collection and use, and formal processes for assessing benefits and risks of using that data are to ways to help curb potential health data privacy risks that stem from wearables, according to a recent...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks