Typically the traditional Healthcare Information "culture" has not been managed or even significantly influenced by centralized IT or InfoSec personnel. The current environment can be heavily fragmented into various functional and geographic groups, each with very different governance programs and priorities which...
A persons PHI can often be so detailed and complete, hackers and fraudsters can refer to it as a "fullz", meaning it contains enough PII to completely take over someone's identity. This makes this information highly valuable to those communities especially as many other types of fraud can also be committed with it....
"Big Data" analytics has an ever growing list of powerful applications. A very common mistake is the collection of large amounts data from disparate sources which often just results in the creation of a very large pool of unrelated "facts," an impenetrable noise where no useable signal can be found.
The Healthcare...
The HHS Office for Civil Rights' much-delayed resumption of its random HIPAA compliance audit program is expected in the coming months. So now is the time to prepare. This session will cover the highest priority tasks that should be started immediately if not already underway to help lay the groundwork for a...
In this session, we'll highlight the major findings from Information Security Media Group's new national survey of healthcare information security leaders. For example, an overwhelming majority of respondents were confident their organization would "pass" a Department of Health and Human Services HIPAA compliance...
The highly fragmented but collaborative health service provider ecosystem, presents a significant challenge in providing reliable access to protected patient health information while keeping it private. How best can we ensure that business associates are taking all the necessary steps to protect patient data and...
With PHI and PII increasingly becoming targets for theft - and steady rise of the resulting embarrassment, fraud, prosecutions and penalties - we need to take a fresh look at how best to protect this data from being exposed in the first place. An effective data protection strategy can only be arrived at by considering...
Mention cloud services to healthcare IT insiders and responses will vary from caution and trepidation to earnest interest. The advantages of low cost, on-demand cloud-based services are clear. However, managing their use and matching an organization's developmental, compliance and risk requirements to the right...
Any device that can communicate with anything else provides a potential open door for the valuable information it accesses and that an organization is responsible for protecting. In our rush to connect everything together, secure information handling is very often an afterthought, if ever even a thought at all.
The...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.