Healthcare Provider

E595c1d49bf4a26f8e14ce59812af80e

Healthcare Data Today: In Motion or Out of Control?

October 28, 2014 Added by:Patrick Oliver Graf

From October 2009 through the present day, one industry alone has reported 900 different breaches. And none of those 900 were limited in their scope – in each, at least 500 individuals were affected. Who knows how many other smaller breaches happened, without public knowledge.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Five Ways to Avoid HIPAA Compliance Breaches With Better Security Controls

June 05, 2014 Added by:InfosecIsland News

To prevent costly breaches such as this one from happening, Netwrix Corporation suggests the following best practices every health care organization or insurance provider should implement and maintain to ensure HIPAA compliance.

Comments  (0)

6d117b57d55f63febe392e40a478011f

U.S. Intelligence Agencies Say Healthcare.gov May be Compromised

February 04, 2014 Added by:Anthony M. Freed

U.S. intelligence agencies warned the Department of Health and Human Services that the Healthcare.gov may have been compromised by contractors from Belarus who worked on developing code for the network who are suspected of inserting malicious code.

Comments  (1)

C787d4daae33f0e155e00c614f07b0ee

The Perils of Combining Security and Compliance

January 27, 2014 Added by:Robb Reck

There is a natural tendency to lump security and compliance together. Intuitively it just makes sense right? The biggest compliance frameworks like PCI, GLBA, SOX and HIPAA are all looking to ensure that our security is up to snuff. In fact, if we do security right, compliance should come naturally, with very little additional technical work.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Iowa Mental Health Institute Warns of Missing Backup Tape

June 26, 2013 Added by:Mike Lennon

The Iowa Department of Human Services on Wednesday warned former patients at the Mental Health Institute in Independence and others, about a possible breach of their confidential information due to a lost backup tape.

Comments  (0)

369dec31d888693bba6b6e0f39c14ce3

Healthcare Interrupted - Top Five Vulnerabilities Hackers Can Use Right Now To Shut Down Medical Devices

June 24, 2013 Added by:Matt Neely

By performing penetration tests on hospital networks and medical devices, security researchers have found that many commonly used devices are insecure and can be easily compromised.

Comments  (0)

A58bf865b185e0e3f665473bf8f3ca6d

Mobile Security Processes Could Be Applied to Medical Devices: Bluebox

May 10, 2013 Added by:Steve Ragan

Before malware could become a threat to medical devices, Adam Ely said attackers would have to write malware specifically targeted to these devices and organizations; or the devices would have to adopt a standard platforms and software.

Comments  (1)

959779642e6e758563e80b5d83150a9f

Celebrity Privacy Breaches and High School Physics

February 01, 2013 Added by:Danny Lieberman

In our previous post on patient privacy, we noted that patient data loss is a lot like planes disappearing in the Bermuda Triangle – no one really knows where the planes disappeared to, since the people on the planes never return to tell the story...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Enterprise Resilience - Healthcare edition (Part 2: Risk Classification)

January 31, 2013 Added by:Rafal Los

Before you tell me that risk classifications are important, water is wet, the sun is hot and ice is cold, I'd like to remind you how many enterprises still do it poorly. I almost wish it was a simple as data telling you it's critical or not, but let's face it the game is very rarely that simple...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Privacy Crusaders – Their Own Worst Enemies

January 28, 2013 Added by:Danny Lieberman

It is no accident that the largest healthcare organizations have the highest rate of patient-privacy breaches. The old saying – “the bigger they are, the harder they fall” is true, but more than that is happening when it comes to patient-privacy breaches in America as a whole...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Fly First Class But Pay Economy for HIPAA Compliance

January 22, 2013 Added by:Danny Lieberman

After the sanity check with the team that constructed the threat scenarios, you and your HIPAA consultant need to calculate your Value at Risk. Calculating VaR will help shed light on where to save money and where to spend money...

Comments  (0)

959779642e6e758563e80b5d83150a9f

The #1 Bermuda Triangle of Patient Privacy – debunking patient data loss

January 05, 2013 Added by:Danny Lieberman

Patient data loss is a lot like planes disappearing in the Bermuda Triangle – no one really knows where the planes disappeared to, since the people on the planes never came back to tell the story. The same way we talk about patient data loss and never really consider how you can “lose” patient data and whether it can be “returned”.

Comments  (2)

Ff632049ba1218ecd55b8122b2112642

All Aboard

December 17, 2012 Added by:Randall Frietzsche

We need a well-conceived set of administrative and technical controls - our policy, while still acknowledging that every living creature on the planet is organically attached to a smart device, must dictate that the user will follow the policy at risk of termination...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Buzzword Compliance Not Enough: Must Haves for Meaningful Use

November 08, 2012 Added by:Danny Lieberman

Many technology vendors tout the idea of self management, and the advantages of mobile healthcare apps, virtual visits, tablets and e-detailing but in fact, a face-to-face relationship with a doctor is more powerful than a digital relationship alone. We don’t need Sherry Turkle to tell us that...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Using brainware to store patient data and ensure patient privacy

October 16, 2012 Added by:Danny Lieberman

If pharmaceutical companies can access data from patients, then they can design and manufacture better products. This is good for patient health but problematic for current regulation of patient privacy. There is no such thing as patient privacy once big commercial ventures like large pharmas get involved...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Auditing Healthcare IT Security with Multiple Threat Scenarios

October 10, 2012 Added by:Danny Lieberman

For small to mid-size hospitals, nursing homes, medical device, healthcare IT vendors will have a much simpler audit and will be primarily interested in how cheaply the audit can be done and how much they can save using the technique of multiple threat analysis...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »