Health IT Data Security
Internet Explorer Vulnerability: Steps To Take
April 29, 2014Faced with a vulnerability that exposes Microsoft’s Internet Explorer Web browser to a zero-day exploit involved in recent targeted attacks, CISOs need to take prompt action, security specialists say. That includes communicating the vulnerability to end users, using alternate Web … Continue reading
Posted in Health IT Data Security | Tagged Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, PHI, PHI Security | Leave a commentWhy Does Healthcare Resist Encryption Technology?
April 18, 2014The most basic security truth in 2014 is that encryption done properly — a high enough level of encryption, proper safeguarding of the encryption key — is the best thing an IT department can do. Sill, many industries resist encryption … Continue reading
Posted in Health IT Data Security | Tagged Encryption Solutions, Encryption Technology, Environmental Intelligence, Health IT Best Practices, Health IT Information Security, Health IT Services, Health IT Tips, PHI, PHI Data Security, PHI Security | Leave a commentPHI Data Breaches Makes Top Five Security Concerns For 2014
December 16, 2013Every year, Coalfire, an IT governance, risk and compliance firm, names its top 5 information security and compliance predictions for the new year. And this time around, healthcare data breaches made the cut. The prediction? Expect a huge increase of … Continue reading
Posted in Health IT Data Security | Tagged BYOD, Cloud Computing, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, medical practice best practices, PHI Data Breaches, PHI Data Security, PHI Security | Leave a commentPatient Portal Security Considerations
November 4, 2013As healthcare facilities launch their own patient portals, technology is only the first step. Administrators are learning that decisions need to be made on everything from patient login protocols to support for patient record revisions. HIPAA regulations, always a primary … Continue reading
Posted in Health IT Data Security | Tagged EHR, EHR Adoption, EHR Consulting, EHR Implementation, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, PHI, PHI Data Security, PHI Security, Stage 2 Meaningful Use Rule | Leave a commentNIST To Review Data Encryption Processes Following NSA Allegations
November 1, 2013The National Institute of Standards and Technology—bedeviled by persistent allegations that its internationally recognized data encryption standards have been compromised by the National Security Agency—announced Friday it will undergo internal and independent formal reviews of its standards development processes for … Continue reading
Posted in Health IT Data Security | Tagged EHR, EHR Adoption, EHR Implementation, Electronic Health Records, Electronic Medical Records, EMR, Environmental Intelligence, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, PHI, PHI Data Security, PHI Security | Leave a comment