Healthcare Information Security

Mobile News

Are There Cybersecurity Flaws in Medical Devices?

by

The US Department of Homeland Security is investigating approximately two dozen cases of suspected cybersecurity flaws in medical devices. Can a hacker actually break through the cybersecurity platforms on current medical devices? That is...

Healthcare BYOD Adoption: Five Security Considerations

by

As we approach the end of 2014, technology continues to evolve and more healthcare organizations are implementing and fine-tuning their BYOD policies. The benefit with BYOD is that healthcare staff members can conveniently use their own...

CIS, MDISS Collaborate On Medical Device Security Guidance

by

With the goal in mind of concentrating on growing security concerns about network-connected medical devices, the Center for Internet Security (CIS) and Medical Device Innovation, Safety and Security Consortium (MDISS) have released new...

Brigham And Women’s ISO Talks FDA, mHealth Device Security

by

Seeing as there has been an abundance of mHealth news and announcements involving mobile device security and Food and Drug Administration (FDA) guidance over the past month or so, the topic is growing increasingly important among security...

NIST Mobile App Security Guidelines: Healthcare Key Points

by

With more smartphones and tablets being used in the workplace, it’s increasingly important for employees to understand the risks associated with third-party mobile applications. The healthcare industry must be especially careful, as...

Balancing Healthcare Cloud Prospects With Security Needs

by

A healthcare organization is constantly weighing short-term plans against long-term goals and ensuring that these different projects are properly aligned isn’t always easy. Dale Atkins, Technical Architect at Munson Medical Center of...

FDA Releases Medical Device Cybersecurity Guidance

by

The Food and Drugs Administration (FDA) released its much-anticipated “Management of Cybersecurity in Medical Devices” guidance to update manufacturers on medical device cybersecurity best practices. Given the explosion of...

Reviewing California’s Mobile App, PHR Privacy Regulations

by

California enacted legislation, AB 658, earlier this year to shield patient health information stored in personal health records personal health records (PHRs) and mobile health applications. Deven McGraw and Susan Ingargiola of Manatt...

How are hospitals handling medical device security?

by

Dale Nordenberg, moderator of the medical device security panel discussion at this year’s HIMSS Privacy and Security Forum, made an interesting point in saying that medical devices fit somewhere between BioMed, IT and security....

FDA, NH-ISAC to share medical device cybersecurity tips, risks

by

As evidenced by the recent announcement of its medical device and cybersecurity workshop on October 21 and 22, 2014, Food and Drug Administration (FDA) is taking medical device cybersecurity seriously. This stance is further supported by...

Enacting healthcare BYOD policies while avoiding risks

by

Did you know that 24,800 patients’ medical data could be exposed to abuse today? According to the Department of Health and Human Services (HHS), that is the number of people whose protected health information was breached per day on...

HIMSS Privacy and Security Forum 2014: Industry trends

by

This year’s HIMSS Privacy and Security Forum, which took place Sept. 8-9, 2014 in Boston, encompassed a wide range of subjects and healthcare trends. But many of healthcare’s newest security challenges were discussed in great...

Expanding clinical communications: Security decisions

by

As healthcare organizations continue to move on from pager-based clinical messaging and begin to take advantage of smart phone technology, ensuring staff members are communicating securely remains a high-level priority. Saint Agnes...

FDA medical device and cybersecurity workshops well-timed

by

With more attention being placed on mHealth and medical device security, the Food and Drug Administration (FDA) chose a good time to provide medical device and cybersecurity workshops. The FDA will hold its “Collaborative Approaches...

Recognizing, isolating a healthcare organization’s latent risks

by

Some security risks within a healthcare organization are more apparent than others, but those underlying threats are no less significant. Fernando Martinez, Senior Vice President, CIO at Parkland Health & Hospital System, sees latent...

FDA announces medical device and cybersecurity workshop

by

The Food and Drug Administration (FDA) announced on Tuesday, Sept. 23 that it will hold a public workshop to help healthcare organizations create collaborative approaches to strengthening medical device cybersecurity. The “Collaborative...

Will mobile giants’ new encryption policies affect health BYOD?

by

Now that Apple has publicized its iOS 8 mobile device privacy and security features that rely on encryption and consent, Google followed suit and said its newest devices will automatically encrypt user data. With Apple and Android trading...

App developers call for more HHS privacy, security guidance

by

A group of healthcare application developers recently called into question what it alleged are outdated government privacy guidance  and unfavorable regulations. In addition to seeking more developer-friendly resources to help them comply...

Conn. AG requests details on Apple Watch privacy practices

by

Connecticut Attorney General George Jepsen is looking for answers regarding the new Apple Watch’s new privacy protections and how Apple plans on enforcing them. Because reports suggest that the Apple Watch will be able to collect,...

Report: Healthcare industry must focus on endpoint security

by

It’s no secret that data encryption continues to be an IT security sore spot in the healthcare industry, but some recent Forrester Report findings reaffirm that endpoint security is a critical issue. According to the Wall Street...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy


no, thanks

Continue to site...