Healthcare Information Security

Mobile News

Is Patient Privacy at Risk with New Healthcare Apps?

by

Will a new photo sharing app for healthcare providers expose patient privacy? As technology continues to evolve, and more healthcare providers implement mobile device policies, it is important that patient privacy still remains a top priority....

Where is the Greatest Health Data Breach Risk for Providers?

by

Health data breach risks can appear in numerous ways, including through relationships with contractors and from lackluster BYOD policies. Healthcare providers need to remain diligent as technology continues to evolve, ensuring that they are taking...

Why Data Security is Crucial for mHealth Benefits

by

Robin Williams, the late actor and comedian, is widely quoted as saying, “If you can remember the ‘60s, then you weren’t there.” Similar sentiment may be also applied to healthcare, where mobile devices and smartphones (collectively known...

Are There Cybersecurity Flaws in Medical Devices?

by

The US Department of Homeland Security is investigating approximately two dozen cases of suspected cybersecurity flaws in medical devices. Can a hacker actually break through the cybersecurity platforms on current medical devices? That is the...

Healthcare BYOD Adoption: Five Security Considerations

by

As we approach the end of 2014, technology continues to evolve and more healthcare organizations are implementing and fine-tuning their BYOD policies. The benefit with BYOD is that healthcare staff members can conveniently use their own devices...

CIS, MDISS Collaborate On Medical Device Security Guidance

by

With the goal in mind of concentrating on growing security concerns about network-connected medical devices, the Center for Internet Security (CIS) and Medical Device Innovation, Safety and Security Consortium (MDISS) have released new resources...

Brigham And Women’s ISO Talks FDA, mHealth Device Security

by

Seeing as there has been an abundance of mHealth news and announcements involving mobile device security and Food and Drug Administration (FDA) guidance over the past month or so, the topic is growing increasingly important among security professionals...

NIST Mobile App Security Guidelines: Healthcare Key Points

by

With more smartphones and tablets being used in the workplace, it’s increasingly important for employees to understand the risks associated with third-party mobile applications. The healthcare industry must be especially careful, as using...

Balancing Healthcare Cloud Prospects With Security Needs

by

A healthcare organization is constantly weighing short-term plans against long-term goals and ensuring that these different projects are properly aligned isn’t always easy. Dale Atkins, Technical Architect at Munson Medical Center of Traverse...

FDA Releases Medical Device Cybersecurity Guidance

by

The Food and Drugs Administration (FDA) released its much-anticipated “Management of Cybersecurity in Medical Devices” guidance to update manufacturers on medical device cybersecurity best practices. Given the explosion of wireless,...

Reviewing California’s Mobile App, PHR Privacy Regulations

by

California enacted legislation, AB 658, earlier this year to shield patient health information stored in personal health records personal health records (PHRs) and mobile health applications. Deven McGraw and Susan Ingargiola of Manatt Health...

How are hospitals handling medical device security?

by

Dale Nordenberg, moderator of the medical device security panel discussion at this year’s HIMSS Privacy and Security Forum, made an interesting point in saying that medical devices fit somewhere between BioMed, IT and security. Given the...

FDA, NH-ISAC to share medical device cybersecurity tips, risks

by

As evidenced by the recent announcement of its medical device and cybersecurity workshop on October 21 and 22, 2014, Food and Drug Administration (FDA) is taking medical device cybersecurity seriously. This stance is further supported by the...

Enacting healthcare BYOD policies while avoiding risks

by

Did you know that 24,800 patients’ medical data could be exposed to abuse today? According to the Department of Health and Human Services (HHS), that is the number of people whose protected health information was breached per day on average...

HIMSS Privacy and Security Forum 2014: Industry trends

by

This year’s HIMSS Privacy and Security Forum, which took place Sept. 8-9, 2014 in Boston, encompassed a wide range of subjects and healthcare trends. But many of healthcare’s newest security challenges were discussed in great depth...

Expanding clinical communications: Security decisions

by

As healthcare organizations continue to move on from pager-based clinical messaging and begin to take advantage of smart phone technology, ensuring staff members are communicating securely remains a high-level priority. Saint Agnes Hospital,...

FDA medical device and cybersecurity workshops well-timed

by

With more attention being placed on mHealth and medical device security, the Food and Drug Administration (FDA) chose a good time to provide medical device and cybersecurity workshops. The FDA will hold its “Collaborative Approaches for...

Recognizing, isolating a healthcare organization’s latent risks

by

Some security risks within a healthcare organization are more apparent than others, but those underlying threats are no less significant. Fernando Martinez, Senior Vice President, CIO at Parkland Health & Hospital System, sees latent risks...

FDA announces medical device and cybersecurity workshop

by

The Food and Drug Administration (FDA) announced on Tuesday, Sept. 23 that it will hold a public workshop to help healthcare organizations create collaborative approaches to strengthening medical device cybersecurity. The “Collaborative Approaches...

Will mobile giants’ new encryption policies affect health BYOD?

by

Now that Apple has publicized its iOS 8 mobile device privacy and security features that rely on encryption and consent, Google followed suit and said its newest devices will automatically encrypt user data. With Apple and Android trading pieces...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks