Healthcare Information Security

Mobile News

Ensuring HIPAA compliance among inpatient, outpatient docs

by

The continuum of care continues to expand and is forcing integrated delivery networks and health systems to reconsider their health data privacy and security practices after addressing the features unique to inpatient and outpatient clinical...

Mobile technology, user impact on hospital BYOD decisions

by

In addition to warmer New England weather, springtime represents a time where Chris Logan, Chief Information Security Officer (CISO) for Care New England Health of Providence, R.I., sees a brand new crop of residents come in wanting to use...

Healthcare BYOD: Choosing the right mobile security vendor

by

More and more employees are using their personal devices, such as smartphones and tablets, for work purposes, which is why BYOD has become a phenomenon. Keeping employees happy and productive with healthcare BYOD is great, but having a mobile...

Secure healthcare communication in a mobile environment

by

Mobile technology has undoubtedly advanced, as today’s smartphone possesses more computing power than NASA did when we first put man on the moon. Power without purpose, however, is chaos and privacy and security are not ancillary considerations...

Tailoring healthcare BYOD policy to bolster mobile security

by

With potential HIPAA audits looming in the distance, healthcare organizations are both ensuring they have the right technologies in place and are revising and updating their internal policies. For Ed Henry, Director of Technology at Princeton...

Seattle Children’s Hospital CISO discusses internal collaboration

by

The idea of having a strong security plan in place for a healthcare organization’s eventual data breach is one that has been discussed at length lately within the industry. But one of the key elements of a strong security plan is the internal...

Medical device hacks pose true threats to providers

by

Most healthcare IT professionals can attest to the fact that medical device management and security are significant roadblocks in building a security program. As the devices become more connected to networks and volume patching becomes more of...

Patient perspective on eHealth, mobile privacy and security

by

According to recently-released results from a Ponemon Institute and Experian Data Breach Resolution report, there are still eHealth services and mobile application privacy and security questions among consumers and patients. The report, titled...

Successful organizational health IT security strategies

by

Most healthcare IT security executives understand that no single solution will keep patient data secure and recognize that instead, a blend of the right technology, people and policy is the right approach. Peter Guerra, a principle in the Booz...

Managing healthcare network security and BYOD needs

by

Though there’s never a true winner in the “ease of use” v. security debate, coming to a happy medium between the two can present challenges for healthcare organizations. This is especially the case when dealing with the impact...

TigerText’s HIPAA guarantee: Provider, vendor ramifications

by

Most healthcare professionals will agree that there are more secure messaging options out there than they can count. With different vendors competing against each other for hospital and provider business with their own versions of mobile platforms...

Mobile health IT security: Bolstering technology with policy

by

One way or another, mobile devices are finding their way into healthcare organizations’ four walls and onto their networks. Each organization’s mobile needs vary based on size and available resources and many have come a long way...

Healthcare CIO perspective on BYOD, security vendor selection

by

In bringing new security technologies into a healthcare organization, from a CIO’s standpoint, there has to be the right mix of compatibility and alignment with internal policy. And in deciding which technologies and vendors would work...

UMC Health System Security Officer discusses user awareness

by

With 14 years under his belt working with government entities in IT security, Phil Alexander, Information Security Officer at University Medical Center (UMC) Health System, certainly has a unique outlook on IT security in the healthcare sector....

Involving nurses in mHealth strategy may boost security

by

When considering how clinical and innovation requirements fit into their mobile strategy, some organizations don’t consider nurses’ needs as well. Spyglass Consulting Group recently released “Point of Care Communications for...

Effective and secure internal communication key for hospitals

by

Those in charge of information technology within healthcare organizations can’t fall into the trap of concentrating on one area of need when it comes to security, which can prove to be difficult when specific incidents pop up. Instead,...

mHealth adoption creates data security challenges

by

The use of mobile devices within healthcare (mHealth) is rising as physicians, nurses, and other healthcare providers enjoy the portability and flexibility that mobile devices allow. Smart phones, tablets, and laptops provide easy access to health...

Mobile-thinking providers must scrutinize security options

by

A healthcare organization’s mobile security strategy involves many considerations, such as whether to allow BYOD or how much access the devices have to an organization’s network. But one shifting area of focus for enterprise security...

Human error tops Ponemon patient data security study threats

by

The Ponemon Institute’s fourth annual Patient Privacy & Data Security Study reviewed new and expanded threats of patient data security and privacy. Based on the results of the study, human error continues to be the biggest source of...

Survey: Data breach risk biggest concern for mHealth use

by

According to a recent Axway survey conducted during HIMSS14, data breaches are the biggest concern in mobile health (mHealth) technology for healthcare IT professionals. Axway is a provider of data flow management software, and its poll surveyed...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks