By Marty Puranik – While the majority of HIPAA violations involve electronic data breaches, the HIPAA Security Rule requires that healthcare providers and business associates implement “physical safeguards for all workstations that access ePHI to restrict access to authorized users.”
By Patrick Yee – One of the biggest trending topics within the healthcare sphere is something that, if all goes well, can be completely invisible. And if something goes wrong, it has the potential to create a crisis-level situation for your organization.
ICIT publishes An Analysis of Responses to Senator Warner’s Health Sector Cybersecurity Inquiries: The Benefits of Proactive Engagement and What We Can Glean from These Questions and Responses.
It has been four years since our first panel discussion addressing the growing and alarming rise of cybersecurity threats to healthcare. Yet, despite the addition of security protocols, and training to thwart hacking incidents, the industry continues to be plagued.
By Arshad Noor – The healthcare industry has a huge responsibility when it comes to information security and protecting sensitive PHI while abiding by its “duty of care” principles. However, the industry continues to suffer large data breaches despite…
By David Holtzman – State governments are not waiting for the United States Congress to pass a comprehensive national set of data privacy and cybersecurity standards. Each of the 50 states now has its own breach notification laws, with nearly one-half adopting data security…
The HIMSS Global Conference & Exhibition brings together 45,000+ health information and technology professionals, clinicians, executives and market suppliers from around the world. Exceptional education, world-class speakers, cutting-edge products and powerful networking are hallmarks of this industry-leading conference. When: February 11-15, 2019 Where: Orange County Convention Center, Orlando FL Hashtag: #HITsecurity Find more Cybersecurity, Privacy […]
By Janet Vogel – The recently-opened Health Sector Cybersecurity Coordination Center (HC3) has been buzzing with the sound of industry collaboration and coordination. HC3 will host tours, and brief stakeholder organizations to share capabilities and services.
By Suzanne B. Schwartz – Ensuring medical devices are safeguarded from cyber intrusions is a shared responsibility across the medical device ecosystem. At the FDA, we deal with cybersecurity in the context of the total product lifecycle of a device.
By Art Gross – It’s no secret that employees violate security policies. Whether we’d like to admit it or not, there’s a good chance we have all violated a security policy once upon a time.
By Sonia Arista – Most cybercriminal behavior can be reduced to two basic economic drivers. The first is to look for targets with valuable resources that can be easily turned into profits. And the second is to expend as few resources as possible to access those resources.
By Art Gross – Cybercriminals have been targeting the healthcare industry for years. As healthcare has become the second largest sector of the U.S. economy, it should come as no surprise that the industry receives special attention from hackers.
OUR STREAMING RADIO STATION
HealthcareNOW Radio – Past Episodes On Demand
Miss any episodes of your favorite HealthcareNOW Radio shows? Find them all on our SoundCloud Channel. Play or Download Here
Get Our eNews Digests
EHR Incentive Program News
More Top Headlines
- AMA Advances New Principles to Put Augmented Intelligence Into the Practice of Medicine
- Healthcare CFO Report
- WEDI Summer Forum: Bridging EDI to API: Working for Today, Preparing for Tomorrow
- The Friday Five – Alzheimer’s and Brain Awareness Month
- How HIPAA and the False Claims Act Can Hurt Whistleblowers
- See all our sites aggregated content on HealthITAnswers.net