Manage
Learn to apply best practices and optimize your operations.
HIPAA Health Insurance Portability and Accountability Act
HIPAA compliance not guaranteed with ePHI security
Medical facilities sometimes believe security is equivalent to compliance with HIPAA -- but not so fast. Organizations must consider other aspects when guarding patient data. Continue Reading
HIPAA requirements steer data protection in healthcare
Although HIPAA may not specify how to protect patient data in the event a system goes down, its requirements make it clear data must remain available and secure. Continue Reading
Achieve HIPAA compliance while keeping data secure
It's not easy balancing patient data security steps with privacy requirements from HIPAA. For starters, getting through to busy clinicians may be a tough task for IT professionals. Continue Reading
-
Data security in healthcare competes with HIPAA compliance
It's not easy balancing patient data security steps with privacy requirements from HIPAA. For starters, getting through to busy clinicians may be a tough task for IT professionals. Continue Reading
Healthcare cybersecurity must complement HIPAA compliance
The biggest threat to healthcare data security is often unauthorized access by staff. Behavior tracking can detect snooping by employees and identify users who have been hacked. Continue Reading
Learn how to detect cyberattacks and prevent them
Cyberattacks have become an all-too-common occurrence. Health IT experts offer advice on how to detect, prevent and recover from cyberattacks using the most effective technologies.Continue Reading
For HIPAA-compliant cloud storage, weigh risks and set recovery steps
Healthcare organizations and the cloud storage providers they work with must conduct risk assessments to confirm that all parties are safeguarding patient data as part of HIPAA-compliant cloud storage.
Cloud companies that handle protected ...Continue Reading
To defend endpoint security in healthcare, technology teams with training
At many hospitals and physician practices, endpoint devices -- such as desktop computers, laptops and smartphones -- can become areas for cybercriminals to exploit. However, a combination of high-tech defense and old-fashioned common sense offer ...Continue Reading
How to meet HIPAA compliance requirements with personal cloud storage
Cloud storage options are popular among end users, but data protection concerns may hinder their acceptance in healthcare. Follow these best practices to secure data in the cloud.Continue Reading
HIPAA violation examples: The five most common mistakes
HIPAA violation examples make headlines every now and then, often with a hefty fine. The Office of Civil Rights laid out the five most common mistakes healthcare organizations make.Continue Reading
-
Security app helps hospital pass CMS risk assessment, HIPAA audit
When faced with a CMS risk assessment and HIPAA audit, Beaufort Memorial Hospital turned to Iatric Systems' Security Audit Manager to help it pass.Continue Reading
Two pros offer HIPAA compliance plan advice for app developers
App developers working on mHealth apps may be bound by HIPAA. Two experts share their advice on how to build a robust HIPAA compliance plan.Continue Reading
How to prevent healthcare cybersecurity vulnerabilities via USB
USBs can create a vulnerable entry point for cyberattacks in healthcare. One CIO details the nuances of the problem and offers up possible solutions.Continue Reading
How to keep cloud services compliant with HIPAA standards
As more healthcare providers send aspects of their business into the cloud, they must be aware that such a move doesn't free them from their HIPAA compliance duties.Continue Reading
Managing and securing all parts of healthcare mobility
Healthcare mobility, the practice of supporting different mobile devices and operating systems, is appealing to physicians, but difficult for IT departments to protect.Continue Reading