Healthcare Information Security

Mobile News

Creating Best Practices for Healthcare IT Wireless Security


There is an interesting trend happening within the modern healthcare world. The proliferation of wireless devices is beginning to outpace wired systems running within healthcare IT environments. Doctors, nurses and healthcare associates are using...

Why Saint Mary’s Hospital Opted for Secure Messaging


Waterbury, Conn.-based Saint Mary’s Hospital recently implemented a secure messaging system to improve its overall clinical communications. The facility opted for Imprivata Cortext, which is a HIPAA-verified secure communications platform for...

How Important is Mobile Security for Healthcare Facilities?


With a recent survey showing an increase in mobile device usage, healthcare facilities must remain vigilant in mobile security. There is no question that more healthcare organizations are finding ways to properly implement regulations to account...

How Healthcare Malware Attacks are Evolving


Healthcare malware attacks are evolving, which is why it is essential for facilities to keep current security measures. As the healthcare industry continues to adopt and implement new technologies, it is essential that facilities also keep their...

Conn. Hospital Implements Secure Text Messaging Solution


Secure text messaging gives healthcare providers the opportunity to quickly – and safely – send critical information to patients. It’s essential to choose a messaging option that not only meets HIPAA regulations, but also meets...

New Bill Hopes to Improve Health IT, Ease Regulations


A bi-partisan bill was introduced this week that seeks to change health IT by altering how the FDA regulates medical devices. Earlier this week two US senators introduced a bill that aims to limit how the Food and Drug Administration regulates...

Why Mobile Health Security Must be a Focus Area


Mobile health security must remain a top priority, especially as a recent survey shows that mobile applications could lead to data breach issues. As health insurance providers increasingly look toward web and mobile application infrastructures,...

Healthcare Security Breach Hits Washington Hospitals


A former employee gained unauthorized access to several hospitals, creating a healthcare security breach. Three Washington hospitals are working to fix their computer systems after a healthcare security breach led to the theft of 35 computers...

Does Healthcare BYOD Create Greater Security Issues?


Recent surveys indicate that healthcare providers and patients could be hesitant over BYOD policies because of potential security risks. With healthcare BYOD policies, providers have the ability to access patient data at their fingertips. Moreover,...

Why Healthcare Providers Should Consider Data Encryption


Healthcare Data Encryption is a crucial tool for providers as they implement BYOD policies and work to strengthen their EHR systems. Healthcare data encryption is becoming an increasingly hot topic, especially as more providers implement EHRs...

Hospital of Univ. of Penn. Enters Secure Messaging World


With electronic medical records (EMRs) quickly becoming the norm, more healthcare organizations are using secure messaging systems to help the expansion into Health Information Exchanges (HIEs). However, it is important for providers to maintain...

Are Healthcare Security Issues Creating Industry Barriers?


A recent Dell survey shows that security issues could be creating barriers to the adoption of big data, mobility, and cloud technology. It should come as no surprise that healthcare security is increasingly becoming a major issue, especially...

Is Patient Privacy at Risk with New Healthcare Apps?


Will a new photo sharing app for healthcare providers expose patient privacy? As technology continues to evolve, and more healthcare providers implement mobile device policies, it is important that patient privacy still remains a top priority....

Where is the Greatest Health Data Breach Risk for Providers?


Health data breach risks can appear in numerous ways, including through relationships with contractors and from lackluster BYOD policies. Healthcare providers need to remain diligent as technology continues to evolve, ensuring that they are taking...

Why Data Security is Crucial for mHealth Benefits


Robin Williams, the late actor and comedian, is widely quoted as saying, “If you can remember the ‘60s, then you weren’t there.” Similar sentiment may be also applied to healthcare, where mobile devices and smartphones (collectively known...

Are There Cybersecurity Flaws in Medical Devices?


The US Department of Homeland Security is investigating approximately two dozen cases of suspected cybersecurity flaws in medical devices. Can a hacker actually break through the cybersecurity platforms on current medical devices? That is the...

Healthcare BYOD Adoption: Five Security Considerations


As we approach the end of 2014, technology continues to evolve and more healthcare organizations are implementing and fine-tuning their BYOD policies. The benefit with BYOD is that healthcare staff members can conveniently use their own devices...

CIS, MDISS Collaborate On Medical Device Security Guidance


With the goal in mind of concentrating on growing security concerns about network-connected medical devices, the Center for Internet Security (CIS) and Medical Device Innovation, Safety and Security Consortium (MDISS) have released new resources...

Brigham And Women’s ISO Talks FDA, mHealth Device Security


Seeing as there has been an abundance of mHealth news and announcements involving mobile device security and Food and Drug Administration (FDA) guidance over the past month or so, the topic is growing increasingly important among security professionals...

NIST Mobile App Security Guidelines: Healthcare Key Points


With more smartphones and tablets being used in the workplace, it’s increasingly important for employees to understand the risks associated with third-party mobile applications. The healthcare industry must be especially careful, as using...


SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
Data Breaches

Our privacy policy

no, thanks