Security policy


View All News

HIPAA Get Started

Bring yourself up to speed with our introductory content

  • Components of a cloud-based healthcare disaster recovery plan

    As more healthcare organizations turn to the cloud for disaster recovery, IT must address HIPAA requirements and connectivity to ensure data is protected in a DR scenario. Continue Reading

  • Hospitals bone up on medical device cybersecurity plans

    Healthcare cybersecurity can be likened to those old movie westerns pitting the good guys against the bad guys. Back then, however, it was easy to distinguish the white hats from the black hats. Not so in today's complex, sinister world of computer hacking, malware, ransomware and botnets, where the black hats stealthily maneuver through the shadows of a cyberspace that has often been compared to the wild wild west. In some respects, healthcare systems have shown definite signs of improvement in preventing certain types of cybercrimes. But crime reductions in one area can mean increases in other areas as cybercriminals turn their attention to easier and perhaps more lucrative targets that threaten medical device cybersecurity.

    The March issue of Pulse opens with the recognition that hackers are forever vigilant at concocting new and innovative ways to steal patient information and disrupt hospital operations. To add insult to injury, the perpetrators are now offering their hacking "best practices" as a service for less than altruistic reasons.

    Along those lines, our cover story reports on healthcare's increasing use of and dependence on connected medical devices and the resulting vulnerability to hacks, namely ransomware. But IT analysts and security executives see artificial intelligence and blockchain as effective weapons in strengthening medical device cybersecurity. In another feature, we examine the misconception that security measures to safeguard electronic protected health information contained in clinical files march in lockstep with HIPAA privacy laws. To overcome that false sense of security, healthcare organizations need to closely assess key HIPAA mandates like risk analysis and policy audits.

    Also in this issue, crippling ransomware attacks are supplanting health data breaches as the greatest enemy to patient privacy and safety. Statistics show that even though the number of patient records breached plummeted last year, ransomware and malware incidents doubled, security threats from insiders continued unabated, and health organizations took longer to discover they were breached. But there are several steps CIOs and CISOs can follow to protect patient information and shore up cybersecurity.

     Continue Reading

  • SharePoint for healthcare aids HIPAA compliance, workflow automation

    Hospital IT may have a love-hate relationship with SharePoint, but features like Information Rights Management can help ensure the security of PHI and other health data. Continue Reading

View All Get Started

Evaluate HIPAA Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage HIPAA

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve HIPAA Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve