April 13, 2018
Facebook's proposal to match anonymized patient data with user profiles has some experts worried about the possible privacy implications of such a project.
December 11, 2017
Disparate systems and siloes plague healthcare when what is needed is true healthcare IT integration. Progress aims to achieve this with its new Health Cloud platform.
August 31, 2017
AWS customers can add graphic acceleration to instances, but with little flexibility. To change that, the cloud provider has finally fulfilled a promise from early last year, with Elastic GPUs that ...
July 31, 2017
The new G3 instance type, one of several features for AWS in July, provides extra power for graphics-intensive workloads.
HIPAA Get Started
Bring yourself up to speed with our introductory content
As more healthcare organizations turn to the cloud for disaster recovery, IT must address HIPAA requirements and connectivity to ensure data is protected in a DR scenario. Continue Reading
Healthcare cybersecurity can be likened to those old movie westerns pitting the good guys against the bad guys. Back then, however, it was easy to distinguish the white hats from the black hats. Not so in today's complex, sinister world of computer hacking, malware, ransomware and botnets, where the black hats stealthily maneuver through the shadows of a cyberspace that has often been compared to the wild wild west. In some respects, healthcare systems have shown definite signs of improvement in preventing certain types of cybercrimes. But crime reductions in one area can mean increases in other areas as cybercriminals turn their attention to easier and perhaps more lucrative targets that threaten medical device cybersecurity.
The March issue of Pulse opens with the recognition that hackers are forever vigilant at concocting new and innovative ways to steal patient information and disrupt hospital operations. To add insult to injury, the perpetrators are now offering their hacking "best practices" as a service for less than altruistic reasons.
Along those lines, our cover story reports on healthcare's increasing use of and dependence on connected medical devices and the resulting vulnerability to hacks, namely ransomware. But IT analysts and security executives see artificial intelligence and blockchain as effective weapons in strengthening medical device cybersecurity. In another feature, we examine the misconception that security measures to safeguard electronic protected health information contained in clinical files march in lockstep with HIPAA privacy laws. To overcome that false sense of security, healthcare organizations need to closely assess key HIPAA mandates like risk analysis and policy audits.
Also in this issue, crippling ransomware attacks are supplanting health data breaches as the greatest enemy to patient privacy and safety. Statistics show that even though the number of patient records breached plummeted last year, ransomware and malware incidents doubled, security threats from insiders continued unabated, and health organizations took longer to discover they were breached. But there are several steps CIOs and CISOs can follow to protect patient information and shore up cybersecurity.Continue Reading
Hospital IT may have a love-hate relationship with SharePoint, but features like Information Rights Management can help ensure the security of PHI and other health data. Continue Reading
Evaluate HIPAA Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Data analytics may be just what the doctor ordered for a Nevada hospital. Findings from a study of genetic, medical, environmental and demographic data could improve population health. Continue Reading
Although Alexa has yet to achieve widespread adoption in healthcare, there are several promising uses that can improve both the patient and end-user experience. Continue Reading
Worry about health IT cybersecurity has shifted from hacker-triggered health data breaches to ransomware and malware exploits that shut down hospitals and threaten patient safety. Continue Reading
Learn to apply best practices and optimize your operations.
A chief medical information officer suggests that giving people easier access to their medical information is one way to improve the patient experience. Continue Reading
So you have an idea for using AI in healthcare software? Be sure you adhere to HIPAA rules, suggests a healthcare regulatory expert, to avoid noncompliance problems. Continue Reading
Behavioral eManipulation, explains Independent Security Evaluators' Ted Harrington, is an attack methodology in which attackers use technical exploits to influence human behavior. Continue Reading
Problem Solve HIPAA Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Michael Cobb details how to argue for a multistep secure code review process, like Microsoft SDL, and the pros of secure coding practices. Continue Reading
In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data breaches in healthcare. Continue Reading
It's not easy balancing patient data security steps with privacy requirements from HIPAA. For starters, getting through to busy clinicians may be a tough task for IT professionals. Continue Reading