A free report offers a detailed method for calculating the potential cost of healthcare breaches and a method for justifying an investment in data security.
The Healthcare Information and Management Systems Society Conference, to be held Feb. 20-24 in Las Vegas, will offer a wealth of educational content on privacy and security issues.
To build an effective information security program, organizations and leaders need to take seven essential steps, including updating a risk assessment, says consultant Tom Walsh.
Healthcare breach statistics reflect an unfortunate trend: "IT security has not really kept pace with the progress that's been made in the adoption of electronic health records," says Dan Berger, CEO of Redspin.
One of the most important healthcare information breach prevention steps is to safeguard mobile devices and limit the data stored on them, says attorney David Szabo.
The extensive news media coverage of a 911 emergency call about actress Demi Moore is calling attention to an important issue: The need to protect privacy.
For Healthcare providers, archiving electronic content is a critical best practice that every organization should follow. It not only assures that you meet your legal obligations to retain patient and client information, it is necessary to ensure compliance with HIPAA regulations. Surprisingly, some organizations...
Email is the single most important tool in helping employees get work done in organizations of all types, including Healthcare providers and others entities subject to HIPAA requirements. That's why outages of even a few minutes in length can create numerous problems for individual email users and organizations that...
The Privacy and Security Tiger Team, which advises federal healthcare regulators, likely will not meet again until after a batch of new regulations is released in the first quarter, says co-chair Deven McGraw.
One reason why encryption is not more broadly used in healthcare is that so many organizations lack an updated risk assessment that identifies the role the technology can play in improving security, says attorney Amy Leopard.
With the tardy addition of the Sutter Health breach, the U.S. tally of major healthcare information breaches now includes 385 incidents affecting more than 19 million individuals since September 2009.
HITRUST has released its Common Security Framework version 4.0, which provides changes that account for federal and state regulations and standards and frameworks such as HIPAA, ISO, NIST and COBIT.
A small health plan in Tennessee is making a big investment in information security, using encryption, secure e-mail and other technologies to help prevent breaches.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.