Blog Posts Tagged with "Healthcare"
March 15, 2011 Added by:Headlines
The DMHC has opened an investigation into the the security practices of Health Net after the company reported that they can not locate nine network server drives from the Rancho Cordova data center that contain as many as 1.9 million current and former customer records...
March 03, 2011 Added by:Rebecca Herold
Most of the lawyers and regulatory analysts I’ve spoken with have indicated that they anticipate most, if not all, of the proposed changes will be enacted into the Final Rule as law by the end of March 2011. Many changes will result, and eight areas will be significantly impacted...
February 23, 2011 Added by:Headlines
"Due to their apparent lack of compliance, as well as demonstrable arrogance with regard to dealing with the OCR investigators, Cignet now has the dubious honor of being the poster child for HIPAA/HITECH willful neglect," said privacy expert and Infosec Island contributor Rebecca Herold...
February 14, 2011 Added by:Jack Anderson
One hopes and believes that with the Senate and the President protecting HITECH that we have at least until 2013 to implement what I feel is the most important program in healthcare today. If your goal is to improve patient care and reduce cost, nothing will have more impact than HITECH...
February 09, 2011 Added by:Jack Anderson
The Health Net breach is the gift that keeps on giving, to the state attorneys general, that is. This fine is just part of the long term ramifications of a data breach. I am sure that United wishes they hadn't acquired Health Net. Bad publicity rubs off...
February 08, 2011 Added by:Danny Lieberman
Considering how much data is exchanged between medical devices and customer service centers/care givers/primary clinical care teams, and how vulnerable this data is, there is a huge amount of work to be done to ensure patient safety, privacy and data delivery...
February 07, 2011 Added by:Mike Meikle
Things seem to not have changed since 2004. EHR is still unpopular, expensive and with the latest research in hand, doesn’t seem to improve productivity or patient care quality. This seems to be true even if you tack on expensive Clinical Decision Support (CDS) systems...
February 02, 2011 Added by:Rebecca Herold
The insider threat is significant in all organizations, but impossible to eliminate completely. However, organizations can significantly reduce the associated risks, and demonstrate due diligence for implementing safeguards, by doing the following...
January 16, 2011 Added by:Jack Anderson
A task based methodology is key to providing a step by step process ensuring a complete and comprehensive programs is established. Metrics for measuring performance allow both internal monitoring of progress as well as the ability to demonstrate compliance levels to business partners...
January 14, 2011 Added by:Headlines
A network server at Seacoast Radiology was illegally accessed by hackers intent on using it to host "Call of Duty: Black Ops" gaming sessions. The server provides storage for records for over 230,000 individuals...
January 10, 2011 Added by:Headlines
Other then breaches reported by the media and a few progressive state websites, there is little or no information available on many data breach events.It is clear without a mandatory national reporting requirement that many data breaches will continue to be unreported, or underreported...
January 06, 2011 Added by:Rebecca Herold
On December 20, 2010, the federal government published “Part II: Regulatory Information Service Center: Introduction to The Regulatory Plan and the Unified Agenda of Federal Regulatory and Deregulatory Actions.” Within it is the long-awaited HHS time line for when they would publish the final rule...
December 27, 2010 Added by:Renee Chronister
The latest Ponemon Institute study reveals 60% of healthcare providers had more than 2 security breaches in the last year with the average breach costing them $2 million. Whoa! It then goes on to state that 70% of hospitals say protecting patient data is not a priority...
November 28, 2010 Added by:Rafal Los
So you're stuck between the proverbial rock and a hard place right? You can't afford commercial apps which at least come with the luxury of risk transference -and you can't afford to do the right thing and see for yourself... or can you?
November 23, 2010 Added by:Headlines
The Department of Health and Human Services released statistics on health information breaches that show a total of 5.35 million records have been compromised since September 2009. One of the most recent breaches at Keystone/AmeriHealth Mercy Health Plans involved over 280,000 records...
November 16, 2010 Added by:Bill Gerneglia
The Benchmark Study on Patient Privacy and Data Security also said hospitals place a low priority on protecting patient data, that enormous vulnerabilities exist, and that many breaches go undetected...
Harvesting Credentials with the Social Engin... Carlson lson on 03-03-2015
PlugX Malware Adopts New Tactic in India Att... hhm1020 hhm1020 on 03-03-2015
OSI Model’s Relevance to Web App Security... Paras Kumar on 03-03-2015