Healthcare Information Security

Mobile News

FDA Releases Medical Device Cybersecurity Guidance

by

The Food and Drugs Administration (FDA) released its much-anticipated “Management of Cybersecurity in Medical Devices” guidance to update manufacturers on medical device cybersecurity best practices. Given the explosion of...

Reviewing California’s Mobile App, PHR Privacy Regulations

by

California enacted legislation, AB 658, earlier this year to shield patient health information stored in personal health records personal health records (PHRs) and mobile health applications. Deven McGraw and Susan Ingargiola of Manatt...

How are hospitals handling medical device security?

by

Dale Nordenberg, moderator of the medical device security panel discussion at this year’s HIMSS Privacy and Security Forum, made an interesting point in saying that medical devices fit somewhere between BioMed, IT and security....

FDA, NH-ISAC to share medical device cybersecurity tips, risks

by

As evidenced by the recent announcement of its medical device and cybersecurity workshop on October 21 and 22, 2014, Food and Drug Administration (FDA) is taking medical device cybersecurity seriously. This stance is further supported by...

Enacting healthcare BYOD policies while avoiding risks

by

Did you know that 24,800 patients’ medical data could be exposed to abuse today? According to the Department of Health and Human Services (HHS), that is the number of people whose protected health information was breached per day on...

HIMSS Privacy and Security Forum 2014: Industry trends

by

This year’s HIMSS Privacy and Security Forum, which took place Sept. 8-9, 2014 in Boston, encompassed a wide range of subjects and healthcare trends. But many of healthcare’s newest security challenges were discussed in great...

Expanding clinical communications: Security decisions

by

As healthcare organizations continue to move on from pager-based clinical messaging and begin to take advantage of smart phone technology, ensuring staff members are communicating securely remains a high-level priority. Saint Agnes...

FDA medical device and cybersecurity workshops well-timed

by

With more attention being placed on mHealth and medical device security, the Food and Drug Administration (FDA) chose a good time to provide medical device and cybersecurity workshops. The FDA will hold its “Collaborative Approaches...

Recognizing, isolating a healthcare organization’s latent risks

by

Some security risks within a healthcare organization are more apparent than others, but those underlying threats are no less significant. Fernando Martinez, Senior Vice President, CIO at Parkland Health & Hospital System, sees latent...

FDA announces medical device and cybersecurity workshop

by

The Food and Drug Administration (FDA) announced on Tuesday, Sept. 23 that it will hold a public workshop to help healthcare organizations create collaborative approaches to strengthening medical device cybersecurity. The “Collaborative...

Will mobile giants’ new encryption policies affect health BYOD?

by

Now that Apple has publicized its iOS 8 mobile device privacy and security features that rely on encryption and consent, Google followed suit and said its newest devices will automatically encrypt user data. With Apple and Android trading...

App developers call for more HHS privacy, security guidance

by

A group of healthcare application developers recently called into question what it alleged are outdated government privacy guidance  and unfavorable regulations. In addition to seeking more developer-friendly resources to help them comply...

Conn. AG requests details on Apple Watch privacy practices

by

Connecticut Attorney General George Jepsen is looking for answers regarding the new Apple Watch’s new privacy protections and how Apple plans on enforcing them. Because reports suggest that the Apple Watch will be able to collect,...

Report: Healthcare industry must focus on endpoint security

by

It’s no secret that data encryption continues to be an IT security sore spot in the healthcare industry, but some recent Forrester Report findings reaffirm that endpoint security is a critical issue. According to the Wall Street...

More organizations investing in IoT security services

by

The Internet of Things (IoT) is a strong cross-industry term that is getting a lot of hype these days, but a recent Gartner report says enterprises will continue to invest in security services over the next few years. According to Gartner,...

Healthcare BYOD policy considerations: Minimizing risk

by

BOSTON – A common theme throughout the HIMSS Privacy and Security Forum this week was acceptance of risk and how much is tolerable for a healthcare organization. The benefit versus risk debate becomes even more interesting when...

BIDMC CIO discusses mobile device, external event risks

by

BOSTON – In detailing some recent security “war stories” at the HIMSS Privacy and Security Forum, John Halamka, CIO of Beth Israel Deaconess Medical Center (BIDMC), reminded the audience that being both proactive and...

Apple bars HealthKit developers from selling health data

by

Apple has answered prominent privacy questions regarding its soon-to-be-released iOS 8 HealthKit application by creating firm data disclosure rules for developers. The tech giant, according to The Guardian, stipulated that developers...

Top five qualities of a healthcare secure messaging platform

by

With the understanding that healthcare organizations absolutely need to implement some type of secure communications platform, the question becomes what should they be looking for in a product? Tech-savvy healthcare organizations know that...

Apple HealthKit collaboration talks: HIPAA implications

by

Though Apple’s HealthKit app won’t be available until the fall when the new iPhone 6 comes out, the consumer tech giant is currently making inroads with major healthcare providers to have them use the software to centrally...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks