Healthcare Information Security

Mobile News

Top five health IT security technology trends of 2013


There was a great deal of technology adoption among healthcare organizations in 2013 with the intent of improving security. Some organizations wanted to ensure they were HIPAA compliant. Others were already HIPAA compliant but wanted to...

How an accountable care CIO handles mHealth security


Because accountable care organizations (ACOs) have such diverse members with different priorities, keeping track of the different types of patient data flowing in a secure way can be demanding. As Tom Samuels, CIO at Quality Independent...

Healthcare CISO prioritizes virtual desktop infrastructure


Connie Sadler, Information Security Officer for the University Medical Center of Southern Nevada, is beginning to plan out her organization’s security plans for 2014 and virtual desktop technology will play a large part in those...

FTC spring webinar to focus on patient mobile app security


The Federal Trade Commission (FTC) will host a series of seminars this spring based on different areas of technology, including healthcare, that have strong benefits but privacy and security concerns continue to be problematic. The FTC...

mHealth privacy, security: More questions than answers


Accessibility to data through various mHealth applications creates some clear benefits for patients and providers – better accessibility and transparency, for example. But wading through the myriad mHealth privacy, confidentiality and...

Top EHR security myths: Encryption and BYOD


Like any other industry, healthcare has a great deal of misinformation floating around security best practices. This is especially the case when it comes to securing a healthcare organization’s EHR data. Review the different...

Addressing BYOD security at a large medical research center


Creating a BYOD program that is secure and sensible for all involved in a healthcare organization is difficult enough when the majority of users have similar responsibilities. But when trying to work through the technical details and...

Mapping out a health IT director’s security responsibilities


Healthcare CIOs and IT Directors are well-known to “wear many hats” and must balance their various responsibilities, but how much weight should they place on each duty one on a day-to-day basis? For these C-level executives...

Top healthcare CISO concerns: Finding the data, BYOD risks


As information security officer at UCSF Medical Center in San Francisco, Rob Winter has many concerns that are top of mind. “With the data security threat landscape constantly changing,” Winter said, “this has varied over...

Healthcare BYOD security considerations and concerns


Hackers know that healthcare C-level executives have a lot to think about with mobile security and BYOD policies, including the volume of data flowing in and out of an organization, general absence of security controls and mixing of...

Reconciling mobile security flaws with health BYOD strategy


A healthcare CISO must always be vigilant for the latest software threats and, nearly as importantly, know how to weed out high-risk security defects from always-present minor flaws. Mobile security is high on CISOs’ priority lists...

FDA rolls out new mobile medical application enforcement


The U.S. Food and Drug Administration (FDA) issued final rules governing mobile medical application development on Monday, which may end up affecting how healthcare organizations use and secure mobile data down the road. The FDA said it...

Plugging in health IT infrastructure security gaps


BOSTON - When a healthcare organization sustains a malicious attack, it needs to continually understand how the hackers were able to get inside the system so it can better prioritize its cybersecurity efforts going forward. That seems...

How EHR system gaps impact pediatricians, patient privacy


Ensuring that an EHR system properly safeguards adult patient information is made easier by the fact that the vast majority EHR vendors and products are tailored to these kinds of patients. The same cannot be said of specialists such as...

EHR and mobile device auditing, security requires vigilance


If you need a few reasons to adapt to the latest security advancements, just look at the calendar for September and circle the “23”. That’s compliance day for the HIPAA Omnibus Rule, which modifies the privacy, security...

Why virtualization doesn’t mean the end of paper-based risks


Virtualizing health information systems allows healthcare organizations and providers to mitigate the risk that sensitive patient data is stored locally and therefore made vulnerable to unauthorized access. “As they virtualize, it gives...

CIS seeks medical device security guidance with RFI


Shortly after the Food and Drug Administration (FDA) offered new guidance on the security of wireless medical device radio frequencies, the Center for Internet Security (CIS) publicized a new initiative in which it aims to better secure...

Despite security risks, BYOD helps nurses be more productive


It may be a huge HIPAA headache, but nurses who take advantage of BYOD policies report feeling more comfortable with their own devices and are more productive when it comes to their daily tasks.  Personal mobile devices help smooth a...

FDA issues encryption, authentication rules for medical devices


The Food and Drug Administration (FDA) has issued new guidance on the radio frequencies of wireless medical devices, including recommendations for authentication and encryption measures to ensure the security of the device and the safety...

Is BYOD, mobile health security an all-or-nothing decision?


In healthcare, the debate over which mobile device strategy to support tends to be divided into two camps: those for and those against bring your own device (BYOD). While policies that give hospital staff the ability to use personal...


SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
Data Breaches

Our privacy policy

no, thanks