New & Notable
Electronic health records security compliance News
October 08, 2020
CISA senior advisor Josh Corman said healthcare CIOs should focus on threat modeling and stronger disaster recovery for better healthcare cybersecurity.
September 30, 2020
A suspected ransomware attack on Universal Health Services is an existential crisis for healthcare organizations that needs to be addressed, according to one security expert.
December 13, 2019
What can the healthcare industry learn about security from finance, retail and manufacturing? Two CISOs who came to healthcare from other industries give their take.
October 18, 2019
The healthcare community uses security as a crutch to deny the sharing of patient data. That has to stop, according to Athenahealth CISO Taylor Lehmann.
Electronic health records security compliance Get Started
Bring yourself up to speed with our introductory content
HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that provides data privacy and security provisions for safeguarding medical information. Continue Reading
A PHI breach is unauthorized access, use or disclosure of individually identifiable health information that is held or transmitted by a healthcare organization or its business associates. Continue Reading
The biggest threat to healthcare data security is often unauthorized access by staff. Behavior tracking can detect snooping by employees and identify users who have been hacked. Continue Reading
Evaluate Electronic health records security compliance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Health IT buyers need security tools to protect against potentially devastating cyberattacks. Compare the leading products and learn about what they each can offer. Continue Reading
Explore these leading products in the cybersecurity market to best protect healthcare systems and patient data from falling victim to cyberattacks. Continue Reading
Find the most effective cybersecurity tools to protect healthcare systems and data by looking at these eight key features and what major vendors offer for these features. Continue Reading
Manage Electronic health records security compliance
Learn to apply best practices and optimize your operations.
They say if you can't beat them, join them. That's the approach some organizations take to hacking -- let the hackers come to them. Continue Reading
In this Q&A, a cybersecurity expert suggests that providers should take a reasoned, commonsense approach to developing a cybersecurity for healthcare program. Continue Reading
Healthcare cybersecurity expert John Nye shares what technologies he recommends that healthcare organizations can use to fight against insider healthcare security threats. Continue Reading
Problem Solve Electronic health records security compliance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Putting together a HIPAA compliance program can be fraught with difficulty. Review best practices and a HIPAA compliance checklist to avoid common pitfalls and pass an audit. Continue Reading
The American Medical Collection Agency data breach exposed the hazard of dealing with service providers. Here are six steps on how to better manage third-party vendors. Continue Reading
Healthcare organizations remain a target for cyberthreats like ransomware and data breaches. These six steps will help health IT departments respond to or prevent cyberattacks. Continue Reading