Healthcare Information Security

Mobile News

Mapping out a health IT director’s security responsibilities

by

Healthcare CIOs and IT Directors are well-known to “wear many hats” and must balance their various responsibilities, but how much weight should they place on each duty one on a day-to-day basis? For these C-level executives with limited...

Top healthcare CISO concerns: Finding the data, BYOD risks

by

As information security officer at UCSF Medical Center in San Francisco, Rob Winter has many concerns that are top of mind. “With the data security threat landscape constantly changing,” Winter said, “this has varied over the...

Healthcare BYOD security considerations and concerns

by

Hackers know that healthcare C-level executives have a lot to think about with mobile security and BYOD policies, including the volume of data flowing in and out of an organization, general absence of security controls and mixing of corporate...

Reconciling mobile security flaws with health BYOD strategy

by

A healthcare CISO must always be vigilant for the latest software threats and, nearly as importantly, know how to weed out high-risk security defects from always-present minor flaws. Mobile security is high on CISOs’ priority lists these...

FDA rolls out new mobile medical application enforcement

by

The U.S. Food and Drug Administration (FDA) issued final rules governing mobile medical application development on Monday, which may end up affecting how healthcare organizations use and secure mobile data down the road. The FDA said it plans...

Plugging in health IT infrastructure security gaps

by

BOSTON - When a healthcare organization sustains a malicious attack, it needs to continually understand how the hackers were able to get inside the system so it can better prioritize its cybersecurity efforts going forward. That seems fairly...

How EHR system gaps impact pediatricians, patient privacy

by

Ensuring that an EHR system properly safeguards adult patient information is made easier by the fact that the vast majority EHR vendors and products are tailored to these kinds of patients. The same cannot be said of specialists such as pediatricians...

EHR and mobile device auditing, security requires vigilance

by

If you need a few reasons to adapt to the latest security advancements, just look at the calendar for September and circle the “23”. That’s compliance day for the HIPAA Omnibus Rule, which modifies the privacy, security and...

Why virtualization doesn’t mean the end of paper-based risks

by

Virtualizing health information systems allows healthcare organizations and providers to mitigate the risk that sensitive patient data is stored locally and therefore made vulnerable to unauthorized access. “As they virtualize, it gives the...

CIS seeks medical device security guidance with RFI

by

Shortly after the Food and Drug Administration (FDA) offered new guidance on the security of wireless medical device radio frequencies, the Center for Internet Security (CIS) publicized a new initiative in which it aims to better secure Internet-enabled...

Despite security risks, BYOD helps nurses be more productive

by

It may be a huge HIPAA headache, but nurses who take advantage of BYOD policies report feeling more comfortable with their own devices and are more productive when it comes to their daily tasks.  Personal mobile devices help smooth a nurse’s...

FDA issues encryption, authentication rules for medical devices

by

The Food and Drug Administration (FDA) has issued new guidance on the radio frequencies of wireless medical devices, including recommendations for authentication and encryption measures to ensure the security of the device and the safety of the...

Is BYOD, mobile health security an all-or-nothing decision?

by

In healthcare, the debate over which mobile device strategy to support tends to be divided into two camps: those for and those against bring your own device (BYOD). While policies that give hospital staff the ability to use personal devices are...

Why are risk analyses key to health IT security management?

by

Risk analyses are vital to identifying privacy and security vulnerabilities resulting from the introduction of novel forms of health information technology (IT). And in an afternoon panel on privacy and security last week’s 2013 eHealth...

Making sense of BYOD policy trends for healthcare

by

A survey released by Acronis and the Ponemon Institute last week titled “2013 Data Protection Trends Research” analyzed the risks organizations across the country take in either having shoddy BYOD policies in place or, even worse, none at...

Weighing the privacy risks of mobile health and fitness apps

by

Privacy Rights Clearinghouse took a long look last week at the privacy and security risks associated with mobile health and fitness apps instead of the usual focus on medical applications. Despite being sometimes free and often beneficial to...

Choosing the right HIPAA-compliant SMS product

by

There are more than enough HIPAA-compliant short message service (SMS) options for healthcare organizations so mobile strategy often comes down to best fit for the organization. Whether it be price, maturity, scalability or other factors involved,...

Larry Ponemon on securing regulated data in healthcare: Q&A

by

Though mobile applications that share files through the cloud such as Box and DropBox can be appealing to consumers, the Ponemon Institute has found that these types of applications can be unsafe in a clinical environment. Ponemon released its...

mHealth patient privacy report reviews mobile security tips

by

The mHealth Alliance, the Thomson Reuters Foundation, Merck and Baker & McKenzie released the “Patient Privacy in a Mobile World” report yesterday that evaluated privacy and security policies from a global perspective. The group of organizations...

Malware threats to BYOD vary by platform, says mobile study

by

The rise of malicious attacks directed at mobile devices should give those charged with overseeing BYOD policies pause in light of the third annual mobile threats report released by Juniper Networks Mobile Threat Center (MTC). “The report...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks