New & Notable
Electronic health records security compliance News
November 04, 2020
In the midst of a pandemic, the last thing healthcare CIOs need is a wave of cyber attacks -- but that's exactly what they might be faced with, and there are reasons why.
November 02, 2020
The FBI, HHS and CISA warn healthcare CIOs of a potential wave of destructive ransomware attacks. Cybersecurity experts offer advice on how they can best prepare.
October 08, 2020
CISA senior advisor Josh Corman said healthcare CIOs should focus on threat modeling and stronger disaster recovery for better healthcare cybersecurity.
September 30, 2020
A suspected ransomware attack on Universal Health Services is an existential crisis for healthcare organizations that needs to be addressed, according to one security expert.
Electronic health records security compliance Get Started
Bring yourself up to speed with our introductory content
HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that provides data privacy and security provisions for safeguarding medical information. Continue Reading
A PHI breach is unauthorized access, use or disclosure of individually identifiable health information that is held or transmitted by a healthcare organization or its business associates. Continue Reading
The biggest threat to healthcare data security is often unauthorized access by staff. Behavior tracking can detect snooping by employees and identify users who have been hacked. Continue Reading
Evaluate Electronic health records security compliance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Health IT buyers need security tools to protect against potentially devastating cyberattacks. Compare the leading products and learn about what they each can offer. Continue Reading
Explore these leading products in the cybersecurity market to best protect healthcare systems and patient data from falling victim to cyberattacks. Continue Reading
Find the most effective cybersecurity tools to protect healthcare systems and data by looking at these eight key features and what major vendors offer for these features. Continue Reading
Manage Electronic health records security compliance
Learn to apply best practices and optimize your operations.
They say if you can't beat them, join them. That's the approach some organizations take to hacking -- let the hackers come to them. Continue Reading
In this Q&A, a cybersecurity expert suggests that providers should take a reasoned, commonsense approach to developing a cybersecurity for healthcare program. Continue Reading
Healthcare cybersecurity expert John Nye shares what technologies he recommends that healthcare organizations can use to fight against insider healthcare security threats. Continue Reading
Problem Solve Electronic health records security compliance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As healthcare organizations face an onslaught of ransomware attacks, channel partners can assist with security initiatives such as zero-trust architectures to prevent breaches. Continue Reading
Putting together a HIPAA compliance program can be fraught with difficulty. Review best practices and a HIPAA compliance checklist to avoid common pitfalls and pass an audit. Continue Reading
The American Medical Collection Agency data breach exposed the hazard of dealing with service providers. Here are six steps on how to better manage third-party vendors. Continue Reading