Healthcare organizations, faced with limited budgets for improving their security posture, can look to risk assessments as a means of guiding allocation of resources to reduce business risk.
Read this report from Intel and Information Security Media Group for expert insights on:
Why many healthcare entities do...
What are organizations' top cloud security concerns, and how are security leaders addressing these concerns through policy, technology and improved vendor management?
These are key questions posed by the 2012 Cloud Computing Security Survey, which was crafted with assistance from leading experts in cloud...
The Department of Health and Human Services has announced that approximately 150 onsite audits will take place throughout 2012, making this a busy year for IT security professionals in the healthcare industry.
Everyone is at risk of being audited so read through this ebook for tips on preparing for your...
Healthcare data is generated by numerous systems and in a wide variety of formats. Add to this an ever changing IT vendor technology landscape and it's no surprise that most healthcare applications do not conform to a single data format. With so many unique formats to contend with, managing this data and deriving...
To determine how well agencies are securing their printing assets, Information Security Media Group and HP launched the 2012 Print Security Survey. This study, aimed at security leaders within U.S. government agencies of all sizes, had a mission to:
Determine the most common types of breaches against printing...
The bring-your-own-device phenomenon has swept global businesses, and the challenge only intensifies with every new wave of smart phones, tablets and portable storage devices.
It's no longer a question of whether organizations will allow employees to use their own mobile devices. That's already happening.
The...
The passage of the HITECH Act and adoption of Electronic Health Records (EHRs) are creating unprecedented amounts of digital health information. While EHRs offer many advantages for patients and providers, they also generate risks that must be managed effectively. A new survey of more than 500 healthcare executives...
If your organization is planning to adopt Meaningful Use to gain Medicare and Medicaid EHR incentive payouts, avoid penalties, or build a stronger security position, you probably have questions about how to meet the measure.
This white paper helps you understand what Meaningful Use means to your organization, and...
2012 is looking to be a busy year for IT Security professionals in the Healthcare industry. The Department of Health and Human Services has announced that approximately 150 onsite audits will take place throughout the year.
Download this white paper to:
Learn how Security Intelligence can help protect ePHI and...
For Healthcare providers, archiving electronic content is a critical best practice that every organization should follow. It not only assures that you meet your legal obligations to retain patient and client information, it is necessary to ensure compliance with HIPAA regulations. Surprisingly, some organizations...
Email is the single most important tool in helping employees get work done in organizations of all types, including Healthcare providers and others entities subject to HIPAA requirements. That's why outages of even a few minutes in length can create numerous problems for individual email users and organizations that...
A former employee of Kaiser Permanente, the largest HMO in the United States, posted confidential information about 140 patients on her blog. Stories of damaging security breaches resulting from intentional or inadvertent exposure of outbound content are all too familiar. They can result in breaches that risk your...
Healthcare is currently being shaped by several major trends, from migration to EHR's, to HIE, caregiver mobility, social media, cloud computing, cost reduction pressure and others. These trends promise compelling benefits, but also drive significant privacy and security risks. Breaches and other security incidents...
Safeguarding Patient Information: Survey Reveals Unfinished Business
Are healthcare organizations doing a good job of protecting patient information? To find out, we conducted our inaugural Healthcare Information Security Today survey.
The survey sheds light on five hot topics:
Key Threats and Mitigation...
HealthcareInfoSecurity's inaugural Healthcare Information Security Today survey is now closed for participation.
Results of this web-based research study, created with the counsel of top healthcare and information security experts, will be available in the coming weeks. The survey explores how information security...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.