Electronic health records security compliance News
January 25, 2017
In this podcast, the HIT Squad talks about hot health IT topics SearchHealthIT expects to cover at HIMSS 2017; they include health data cybersecurity and value-based healthcare.
December 15, 2016
Cognitive computing may be the next big advance in health IT security. According to a recent study from the IBM Institute for Business Value, nearly 60% of security professionals say cognitive ...
November 04, 2016
In keynote at CHIME16 Fall CIO Forum conference of healthcare CIOs, White House CIO Tony Scott says they should be wary of the internet of things and focus on cybersecurity.
September 28, 2016
Get used to it. Blockchain is invading health IT. And it's moving fast. Sure, while blockchain's encrypted distributed ledger technology has already made big inroads in the finance sector, in ...
Electronic health records security compliance Get Started
Bring yourself up to speed with our introductory content
A PHI breach is unauthorized access, use or disclosure of individually identifiable health information that is held or transmitted by a healthcare organization or its business associates. Continue Reading
The biggest threat to healthcare data security is often unauthorized access by staff. Behavior tracking can detect snooping by employees and identify users who have been hacked. Continue Reading
Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a contract between a HIPAA-covered entity and a HIPAA business associate (BA). Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Electronic health records security compliance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
While providers have made progress on cybersecurity, malware and insider threats are still rampant; newer technologies like access control and behavioral analytics are effective. Continue Reading
The financial fallout from ransomware involves more than bitcoins, one study found. Targeted companies invest in security technology and fear loss of reputation and customers. Continue Reading
It's not easy balancing patient data security steps with privacy requirements from HIPAA. For starters, getting through to busy clinicians may be a tough task for IT professionals. Continue Reading
Manage Electronic health records security compliance
Learn to apply best practices and optimize your operations.
There is no magic bullet, no single software that will fully secure a healthcare organization. But there are strategies that will help with hospital cybersecurity. Experts weigh in. Continue Reading
Healthcare organizations should be sure to include updated log management configuration and a comprehensive security framework in their ePHI security plan. Continue Reading
Cyberattacks have become an all-too-common occurrence. Health IT experts offer advice on how to detect, prevent and recover from cyberattacks using the most effective technologies. Continue Reading
Problem Solve Electronic health records security compliance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In order to achieve interoperability of security tools and strengthen security, one CIO said that there must be security standards for healthcare information systems. Continue Reading
Security is a top concern in health IT, especially given that attacks have become more sophisticated and frequent. A CIO talks about key technologies for preventing ransomware. Continue Reading
Fighting ransomware in healthcare is an ongoing and seemingly never-ending battle. A health IT security expert discusses effective tactics healthcare organizations can take. Continue Reading