Healthcare Information Security

Cloud News

IT expert discusses healthcare security challenges, training

by

With new technology infrastructure going into healthcare organizations and massive amounts of data being filtered through them, there isn’t a single set of policies or products that can help these organizations adhere to security best practices....

DDoS attack considerations for healthcare organizations

by

Recent discussions of distributed denial-of-service (DDoS) threats in healthcare have mainly been in connection with a supposed DDoS attack on Healthcare.Gov that failed last fall. However, the conversation shouldn’t be limited to the...

McAfee threat report cites mobile malware, social attacks

by

The McAfee Labs’ 2014 Threats Predictions report spanned a number of different areas of concern in IT security. Though, by nature, a company such as McAfee makes its business on ensuring the public knows the potential threats and how its...

Amazon Web Services encryption partners try new strategies

by

2014 is a new year, but public cloud vendors are still trying to find ways to get healthcare organizations to believe in public cloud encryption and key management. For example, Amazon Web Services (AWS) Marketplace has a number of encryption...

Public cloud survey cites security perception as an obstacle

by

A recent survey that polled nearly 250 Internet infrastructure decision makers world-wide aimed at getting a better idea of public cloud adoption, requirements and challenges across the different industries, including healthcare. Though there...

IT security consultant’s 2014 predictions: Healthcare impact

by

Year-end lists are common in healthcare, as just about everyone (including HealthITSecurity.com) has a “best of” or “top” list to offer come mid-December. While these vendor lists may have include underlying business reasons...

UCHealth picks Office 365: The BAA effect on cloud security

by

We know the benefits of cloud computing for healthcare organizations – a subscription model can save an organization from the heavy costs of owning and maintaining its own servers. But there has been great cloud trepidation among these organizations...

Citrix, VMware offer software assisting HIPAA compliance

by

New Citrix ShareFile Cloud aids HIPAA compliance Citrix ShareFile Cloud for Healthcare, Citrix’s virtual private cloud offering for file sharing, is now available to healthcare organizations looking to secure and manage protected health...

Focusing on web-based threats in a health cloud environment

by

From a regulatory and technical perspective, securing EHRs in a cloud environment both creates and eliminates different types of risks. Ensuring patients’ EHR data is safe is important because of the nature and concentration of that data,...

Surveying healthcare cloud encryption options, strategies

by

Healthcare organizations are mainly attracted to cloud computing for its flexibility, elasticity and the pay-as-you-go economic model. But since these features attracted them to the cloud in the first place, they don’t want to sacrifice...

Combing through health cloud security vendors: CISO options

by

Sometimes, you have to provide those who are unsure about the realities of cloud computing with a reality check. Bruce Forman, Chief Information Security Officer (CISO) of UMass Memorial Medical Center, often presents on cloud computing security...

CSA report: Big data analytics can improve IT security

by

The Cloud Security Alliance (CSA) Big Data Working Group recently released its Big Data Analytics for Security Intelligence report that concentrates on how big data can improve information security best practices. In trying to find big data...

How HIPAA affects healthcare cloud computing decisions

by

HIPAA covered entities as well as many of their business associate (BA) service providers, including cloud service providers, were bound to the HIPAA Omnibus Rule on Sept. 23, 2013. Part of the reason for the HIPAA Omnibus Rule was to ensure...

Healthcare cloud security: Staying current with BAAs, SLAs

by

BOSTON – No healthcare privacy and security discussion would be complete with the mention of cloud computing and last week’s HIMSS Privacy and Security Forum didn’t disappoint. The “Managing Security Risks of Health Data in the...

Gmail privacy questions raise healthcare security concerns

by

Though Google has professed a disinterest in contractually engaging healthcare organizations, the cloud email service giant continues to be a polarizing figure in the data privacy conversation. A recent Google court filing stated that those sending...

Does cloud computing threaten patient privacy, data security?

by

The rise of cloud computing has created a host of new challenges for patient privacy and data security, according to two Seton Hall School of Law professors.  In a white paper released last month, Frank Pasquale and Tara Adams Ragone assert...

Larry Ponemon on securing regulated data in healthcare: Q&A

by

Though mobile applications that share files through the cloud such as Box and DropBox can be appealing to consumers, the Ponemon Institute has found that these types of applications can be unsafe in a clinical environment. Ponemon released its...

Secure healthcare cloud load-balancing: Time to go virtual

by

The modern healthcare environment now spans multiple networks, multiple locations – all across the country. Healthcare data centers are being created to house more data and a lot more users. In some cases, these data centers are located...

Tying together healthcare public and private cloud security

by

The amount of attention paid to the differences in securing public and private clouds has dissipated over time to the point now where, though they do have their variances, many of the same security practices can be applied to both public and...

How does cloud computing factor into health data breaches?

by

When discussing healthcare data breaches related to cloud computing, much of the conversation seems to be in the future tense. Though many organizations are beginning to become comfortable with putting data and even protected health information...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks