Tag Archives: Encryption Technology
Why Does Healthcare Resist Encryption Technology?
April 18, 2014The most basic security truth in 2014 is that encryption done properly — a high enough level of encryption, proper safeguarding of the encryption key — is the best thing an IT department can do. Sill, many industries resist encryption … Continue reading
Posted in Health IT Data Security | Tagged Encryption Solutions, Encryption Technology, Environmental Intelligence, Health IT Best Practices, Health IT Information Security, Health IT Services, Health IT Tips, PHI, PHI Data Security, PHI Security | Leave a commentNo Encryption Results In Largest Reported PHI Data Breach
September 3, 2013One warm night in mid-July, more than 4 million patient records breezed out the door of the Advocate Medical Group administrative office in Park Ridge, Ill., in the arms of an unidentified thief who stole four computers from the largest … Continue reading
Posted in PHI Data Security | Tagged EHR, EHR Best Practices, EHR Consulting, EHR Implementation, Electronic Health Records, Electronic Medical Records, EMR, Encryption Solutions, Encryption Technology, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, medical practice best practices, Patient Experience, PHI, PHI Data Breaches, PHI Data Security, PHI Security | Leave a commentFour Key Steps When Evaluating Encryption For PHI Data Security
May 20, 2013Encryption is an important breach prevention tool. But to make the right decisions about how to apply encryption, healthcare organizations should take four key steps The first step is to precisely identify where all protected health information is stored. Today, … Continue reading
Posted in Environmental Intelligence, PHI Data Security | Tagged CMS Policy, Encryption Solutions, Encryption Technology, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, HHS, HIPAA Compliance, HIPAA Privacy and Security Rules, HITECH Act, Meaningful Use, Patient Experience, PHI, PHI Data Breaches, PHI Data Security, PHI Security, Stage 2 Meaningful Use Rule | Leave a comment