New & Notable
Electronic health records security compliance News
August 13, 2019
Intraprise Health introduced new software designed to prevent healthcare security breaches by monitoring third-party risks across the enterprise and improving security management processes.
July 16, 2019
The key to implementing healthcare cybersecurity best practices is to start small, according to Erik Decker, chief security and privacy officer for University of Chicago Medicine.
March 19, 2018
Healthcare cybersecurity woes continue unabated, with more frequent cyberattacks amid a lack of IT talent and employee awareness, but organizations are spending more on security.
May 19, 2017
The WannaCry ransomware attack affected hundreds of countries and hundreds of thousands of systems, including health systems. Experts discuss what healthcare orgs need to do.
Electronic health records security compliance Get Started
Bring yourself up to speed with our introductory content
HIPAA (Health Insurance Portability and Accountability Act of 1996) is United States legislation that provides data privacy and security provisions for safeguarding medical information. Continue Reading
A PHI breach is unauthorized access, use or disclosure of individually identifiable health information that is held or transmitted by a healthcare organization or its business associates. Continue Reading
The biggest threat to healthcare data security is often unauthorized access by staff. Behavior tracking can detect snooping by employees and identify users who have been hacked. Continue Reading
Evaluate Electronic health records security compliance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Health IT buyers need security tools to protect against potentially devastating cyberattacks. Compare the leading products and learn about what they each can offer. Continue Reading
Explore these leading products in the cybersecurity market to best protect healthcare systems and patient data from falling victim to cyberattacks. Continue Reading
Find the most effective cybersecurity tools to protect healthcare systems and data by looking at these eight key features and what major vendors offer for these features. Continue Reading
Manage Electronic health records security compliance
Learn to apply best practices and optimize your operations.
In this Q&A, a cybersecurity expert suggests that providers should take a reasoned, commonsense approach to developing a cybersecurity for healthcare program. Continue Reading
Healthcare cybersecurity expert John Nye shares what technologies he recommends that healthcare organizations can use to fight against insider healthcare security threats. Continue Reading
After weathering the infamous Anthem data breach, Steve Moore has learned a thing or two about healthcare cybersecurity. He shares the main challenges he thinks healthcare needs to overcome. Continue Reading
Problem Solve Electronic health records security compliance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The American Medical Collection Agency data breach exposed the hazard of dealing with service providers. Here are six steps on how to better manage third-party vendors. Continue Reading
Healthcare organizations remain a target for cyberthreats like ransomware and data breaches. These six steps will help health IT departments respond to or prevent cyberattacks. Continue Reading
Social engineering continues to be a threat to healthcare organizations. Hospital IT departments must be aware of the common techniques use to deceive unsuspecting users. Continue Reading