Electronic health records security compliance
New & Notable
Electronic health records security compliance News
-
November 04, 2020
04
Nov'20
Hospitals make themselves a target for cyber attacks
In the midst of a pandemic, the last thing healthcare CIOs need is a wave of cyber attacks -- but that's exactly what they might be faced with, and there are reasons why.
-
November 02, 2020
02
Nov'20
Cybersecurity advisory a 'call to arms' for healthcare CIOs
The FBI, HHS and CISA warn healthcare CIOs of a potential wave of destructive ransomware attacks. Cybersecurity experts offer advice on how they can best prepare.
-
October 08, 2020
08
Oct'20
Healthcare cybersecurity needs a dose of threat modeling
CISA senior advisor Josh Corman said healthcare CIOs should focus on threat modeling and stronger disaster recovery for better healthcare cybersecurity.
-
September 30, 2020
30
Sep'20
Attack on Universal Health Services a cry for change
A suspected ransomware attack on Universal Health Services is an existential crisis for healthcare organizations that needs to be addressed, according to one security expert.
Electronic health records security compliance Get Started
Bring yourself up to speed with our introductory content
-
HIPAA (Health Insurance Portability and Accountability Act)
HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that provides data privacy and security provisions for safeguarding medical information. Continue Reading
-
PHI breach (protected health information breach)
A PHI breach is unauthorized access, use or disclosure of individually identifiable health information that is held or transmitted by a healthcare organization or its business associates. Continue Reading
-
Healthcare cybersecurity must complement HIPAA compliance
The biggest threat to healthcare data security is often unauthorized access by staff. Behavior tracking can detect snooping by employees and identify users who have been hacked. Continue Reading
Evaluate Electronic health records security compliance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Deploy healthcare cybersecurity tools to protect vital data
Health IT buyers need security tools to protect against potentially devastating cyberattacks. Compare the leading products and learn about what they each can offer. Continue Reading
-
Health IT security should consider these leading vendors
Explore these leading products in the cybersecurity market to best protect healthcare systems and patient data from falling victim to cyberattacks. Continue Reading
-
The 8 key ways to assess healthcare data security tools
Find the most effective cybersecurity tools to protect healthcare systems and data by looking at these eight key features and what major vendors offer for these features. Continue Reading
Manage Electronic health records security compliance
Learn to apply best practices and optimize your operations.
-
How hiring ethical hackers can help healthcare organizations
They say if you can't beat them, join them. That's the approach some organizations take to hacking -- let the hackers come to them. Continue Reading
-
Take commonsense approach to cybersecurity for healthcare plan
In this Q&A, a cybersecurity expert suggests that providers should take a reasoned, commonsense approach to developing a cybersecurity for healthcare program. Continue Reading
-
Ward off insider healthcare security threats with this tech
Healthcare cybersecurity expert John Nye shares what technologies he recommends that healthcare organizations can use to fight against insider healthcare security threats. Continue Reading
Problem Solve Electronic health records security compliance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Healthcare security services firms tackle ransomware spike
As healthcare organizations face an onslaught of ransomware attacks, channel partners can assist with security initiatives such as zero-trust architectures to prevent breaches. Continue Reading
-
HIPAA compliance checklist: The key to staying compliant in 2020
Putting together a HIPAA compliance program can be fraught with difficulty. Review best practices and a HIPAA compliance checklist to avoid common pitfalls and pass an audit. Continue Reading
-
6 steps to better third-party risk management
The American Medical Collection Agency data breach exposed the hazard of dealing with service providers. Here are six steps on how to better manage third-party vendors. Continue Reading