Healthcare Information Security

Mobile News

Will mobile giants’ new encryption policies affect health BYOD?

by

Now that Apple has publicized its iOS 8 mobile device privacy and security features that rely on encryption and consent, Google followed suit and said its newest devices will automatically encrypt user data. With Apple and Android trading pieces...

App developers call for more HHS privacy, security guidance

by

A group of healthcare application developers recently called into question what it alleged are outdated government privacy guidance  and unfavorable regulations. In addition to seeking more developer-friendly resources to help them comply with...

Conn. AG requests details on Apple Watch privacy practices

by

Connecticut Attorney General George Jepsen is looking for answers regarding the new Apple Watch’s new privacy protections and how Apple plans on enforcing them. Because reports suggest that the Apple Watch will be able to collect, store...

Report: Healthcare industry must focus on endpoint security

by

It’s no secret that data encryption continues to be an IT security sore spot in the healthcare industry, but some recent Forrester Report findings reaffirm that endpoint security is a critical issue. According to the Wall Street Journal,...

More organizations investing in IoT security services

by

The Internet of Things (IoT) is a strong cross-industry term that is getting a lot of hype these days, but a recent Gartner report says enterprises will continue to invest in security services over the next few years. According to Gartner, more...

Healthcare BYOD policy considerations: Minimizing risk

by

BOSTON – A common theme throughout the HIMSS Privacy and Security Forum this week was acceptance of risk and how much is tolerable for a healthcare organization. The benefit versus risk debate becomes even more interesting when weighing an...

BIDMC CIO discusses mobile device, external event risks

by

BOSTON – In detailing some recent security “war stories” at the HIMSS Privacy and Security Forum, John Halamka, CIO of Beth Israel Deaconess Medical Center (BIDMC), reminded the audience that being both proactive and meticulous...

Apple bars HealthKit developers from selling health data

by

Apple has answered prominent privacy questions regarding its soon-to-be-released iOS 8 HealthKit application by creating firm data disclosure rules for developers. The tech giant, according to The Guardian, stipulated that developers cannot sell...

Top five qualities of a healthcare secure messaging platform

by

With the understanding that healthcare organizations absolutely need to implement some type of secure communications platform, the question becomes what should they be looking for in a product? Tech-savvy healthcare organizations know that there...

Apple HealthKit collaboration talks: HIPAA implications

by

Though Apple’s HealthKit app won’t be available until the fall when the new iPhone 6 comes out, the consumer tech giant is currently making inroads with major healthcare providers to have them use the software to centrally store patient...

Sen. Schumer: FTC should regulate fitness tracking devices

by

U.S. Sen. Chuck Schumer has called for the Federal Trade Commission (FTC) to form stricter guidelines for fitness tracker and bracelet vendors to allow users to opt out of data tracking. Schumer wants to give patients the opportunity to opt out...

BYOD security report: Tools and budget trends

by

It’s well-understood that security and employee satisfaction are the major concerns and drivers, respectively, of healthcare BYOD adoption. But where do cross-industry organizations stand on these critical areas of mobile device strategy?...

How Apple-IBM deal may affect healthcare mobile security

by

It’s been a few weeks since Apple and IBM announced their new partnership, which made waves in a number of verticals, including healthcare. The argument could be made that the move prompted follow-up moves, such as Blackberry’s Secusmart...

Healthcare mobile security vendor arms race heats up

by

In acquiring former partner Secusmart, BlackBerry’s message was clear that, much like its competitors, it’s using security expertise acquisition as a platform to rejoin the enterprise mobile elite. Coming on the heels of last week’s...

Do third parties regularly access consumer health data?

by

Consumer-generated healthcare data privacy doesn’t appear to have caused too many ripples in the general public’s consciousness to this point. But a recent California Healthcare Foundation report looks at how personal health information...

Survey reviews IT security threats: Healthcare results

by

A recent IDG Connect and ForeScout survey, titled the State of IT Cyber Defense Maturity Report, reviewed the different security threats posed against finance, manufacturing, healthcare, retail and education organizations across the world. The...

Boston Children’s Hospital CISO talks secure messaging

by

Boston Children’s Hospital is among the latest hospitals to embrace, not attempt to block, clinical text messaging. As Paul Scheib, Children’s IT Director and Chief Information Security Officer (CISO), explained to HealthITSecurity.com how...

Apple HealthKit privacy questions for providers, developers

by

As referenced by Rocky Mountain Human Services (RMHS) IT Director Frank Baer, there is no turning back from the confluence of mHealth applications and healthcare privacy concerns. Instead, organizations must go head-first into mobile security....

Securing a healthcare mobile environment during EHR transition

by

As evidenced by all of the recent healthcare regulation news, our industry is in a state of evolution. While government, healthcare professionals and patients are the ones actually driving change, it is technology that is helping to power and...

mHealth Android app security review: Attack surfaces

by

A recent study by University of Illinois at Urbana-Champaign computer science student Dongjing He reviewed how some mHealth Android applications present privacy and security issues. In her “Security threats to Android apps” abstract,...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks