Healthcare Information Security

Mobile News

Survey: Data breach risk biggest concern for mHealth use


According to a recent Axway survey conducted during HIMSS14, data breaches are the biggest concern in mobile health (mHealth) technology for healthcare IT professionals. Axway is a provider of data flow management software, and its poll surveyed...

Using encryption at rest to enhance healthcare BYOD security


The confluence of mobile devices being widely distributed within healthcare organizations and data breaches involving unencrypted devices means there’s been plenty of discussion about mobile device encryption. Since most of these breaches...

HIMSS14: 10 healthcare data security challenges


This week many of us will head off to the HIMSS14 annual conference in Orlando. For some this will represent a break from this years harsh winter weather, for others a welcome break from the routine and a chance to see what’s new, and for others...

SANS survey analyzes health endpoint vulnerabilities


The recently-released 2014 SANS Securing the Internet of Things Survey collected healthcare organizations’ data between September 2012 and October 2013 and evaluated the effectiveness of cybersecurity strategies in combating industry vulnerabilities....

U.S. Senators: FDA healthcare regulation should be narrowed


There have been growing regulatory concerns in the healthcare industry because there’s a lack of clarity as to which government entities are in charge of different areas of compliance. To help ease some of this confusion, U.S. Senators...

Network security factors into healthcare wireless upgrades


Last week, Torrance Memorial Medical Center, a 401-bed, non-profit medical center in Los Angeles County, announced it was deploying an Aruba wireless local area network (LAN). Among the reasons for the update was to improve wireless infrastructure...

How will FDA regulations affect mHealth security efforts?


There has been a great deal of talk lately around which federal regulatory bodies have jurisdiction over keeping data private and secure in healthcare. While the battle between Federal Trade Commission (FTC) and LabMD mercifully ended last week,...

McAfee threat report cites mobile malware, social attacks


The McAfee Labs’ 2014 Threats Predictions report spanned a number of different areas of concern in IT security. Though, by nature, a company such as McAfee makes its business on ensuring the public knows the potential threats and how its...

Privacy must grow along with mHealth technology


The popularity of mHealth shouldn’t surprise anyone, as consumer habits have already begun to intertwine with enterprise technology needs. But as mHealth technology continues to develop, so will concentration on data privacy and security...

Cisco 2014 Annual Security Report identifies latest trends


The recently-released Cisco 2014 Annual Security Report offers a cross-industry look at the major security concerns at the moment as well as malware and vulnerability trends that will be significant in projecting healthcare IT security focuses...

VMware buys mobile security vendor AirWatch for $1.54 billion


In a buyout that may affect the healthcare industry from a mobile security standpoint, VMware announced today that it has agreed to acquire mobile security company AirWatch for $1.54 billion. The deal will be part of the VMware, which is among...

Looking at both sides of the BYOD remote wipe policy debate


Many healthcare organizations that have BYOD policies and procedures in place to ensure the device and, more importantly, the data on the device are secure. And as part of those policies, organizations will stipulate that can remote wipe the...

Healthcare privacy, security 2014 predictions: Future trends


A hectic 2013 has certainly set the stage for a busy 2014 packed with healthcare organizational policy changes and technology advancements. Based on healthcare expert feedback and interviews in 2013, has come up with five...

Top five health IT security technology trends of 2013


There was a great deal of technology adoption among healthcare organizations in 2013 with the intent of improving security. Some organizations wanted to ensure they were HIPAA compliant. Others were already HIPAA compliant but wanted to make...

How an accountable care CIO handles mHealth security


Because accountable care organizations (ACOs) have such diverse members with different priorities, keeping track of the different types of patient data flowing in a secure way can be demanding. As Tom Samuels, CIO at Quality Independent Physicians...

Healthcare CISO prioritizes virtual desktop infrastructure


Connie Sadler, Information Security Officer for the University Medical Center of Southern Nevada, is beginning to plan out her organization’s security plans for 2014 and virtual desktop technology will play a large part in those efforts....

FTC spring webinar to focus on patient mobile app security


The Federal Trade Commission (FTC) will host a series of seminars this spring based on different areas of technology, including healthcare, that have strong benefits but privacy and security concerns continue to be problematic. The FTC recently...

mHealth privacy, security: More questions than answers


Accessibility to data through various mHealth applications creates some clear benefits for patients and providers – better accessibility and transparency, for example. But wading through the myriad mHealth privacy, confidentiality and security...

Top EHR security myths: Encryption and BYOD


Like any other industry, healthcare has a great deal of misinformation floating around security best practices. This is especially the case when it comes to securing a healthcare organization’s EHR data. Review the different misnomers that...

Addressing BYOD security at a large medical research center


Creating a BYOD program that is secure and sensible for all involved in a healthcare organization is difficult enough when the majority of users have similar responsibilities. But when trying to work through the technical details and policy barriers...


SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
Data Breaches

Our privacy policy

no, thanks