Within health systems such as Navicent Health, the already serious risk of targeted threats is compounded. Besides laptops, notebook computers, and smartphones, the hospital's network hosts numerous biomedical devices that are not under the control of the in-house
technology team, and do not run standard antivirus...
In today's Cybercrime black market, protected healthcare data has become even more valuable than credit card information. Hackers are increasing in sophistication and gaining access to unencrypted data - costing health organizations millions and destroying reputations.
Don't become tomorrow's headline; learn how...
You can't stop taking care of patients when the computers are down. Whether you are entering patients' data into their records or sending billing information to an off-site accounting service, you need that access to continue non-stop. See how you can save time and money with an active-active, highly available file...
Last year, several high profile security incidents occurred at healthcare organizations where a HIPAA Risk Assessment (HSRA) had previously been conducted. This should provoke some pointed questions: Was the HSRA comprehensive enough? Was the remediation plan implemented correctly and in a timely manner? Was an...
Organizations are at a crossroads when deciding on the proper course of action for compliance with regulations applicable to the healthcare industry and how to manage risk to the security of sensitive health information. This is an important decision that shapes the foundation of an organization's security culture and...
Distributed healthcare networks have grown in complexity over the last decade as they expand network access and add more sophisticated security technologies to protect their networks. In addition, the adoption of standards such as the Payment Card Industry Data Security Standard (PCI DSS) and HIPAA have also improved...
A Florida law that takes effect July 1 toughens the state's data breach notification statute by, in part, broadening the term "personal information" to include individuals' usernames and e-mail addresses under certain circumstances.
In this resource, Dr. Alan Snell, former CMIO, and Jeffrey Short, a healthcare attorney, share insights on medical device risks that are easily missed, and easily catastrophic, with repercussions ranging from HIPAA violations to patient harm.
More importantly, they offer guidance on what healthcare leaders can...
Information security and privacy work in healthcare environments often requires a depth of specialized knowledge and competency that can be validated through the help of professional credentialing, says CISO Sean Murphy.
Covered entities and business associates will be under heightened data privacy and security scrutiny in 2014. But experts say there are several basic steps those organizations can take to ensure HIPAA compliance.
New payment card security standards issued by the PCI Council include a number of improvements, plus some glaring omissions, such as requirements for mobile, security experts say. What are their chief concerns?
A congressional committee grilled representatives from four technology vendors providing services for the Obamacare website, questioning, for example, whether the site is putting consumer privacy at risk.
Consumer advocate Deven McGraw describes how a new federal rule spells out four factors that must be weighed in a risk assessment to determine if a health data breach must be reported.
The HIPAA Omnibus Rule stresses the need for business associates to adequately safeguard patient information. What are the implications? Here's what a federal privacy officer and a consumer advocate have to say.
How is the six-hospital Barnabas Health delivery system tackling the challenge of complying with the new HIPAA Omnibus rule? Hussein Syed, director of IT security, explains.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.