The risk of medical identity theft is growing as more hospitals and physicians adopt electronic health records and prepare to exchange this information, experts say.
Although there's plenty of talk about cybersecurity threats involving devious international hackers, the real threat to the security of healthcare information, I believe, is staff members who aren't paying enough attention to the little details. The Gartner Group's John Pescatore said it well in a recent interview:...
A risk analysis should not be an annual event, but rather an ongoing process that's revisited whenever a healthcare organization adds or changes any application. That's the advice of Kenneth Bradberry, vice president and chief technology officer at ACS, a consulting firm recently acquired by Xerox.
Sitting in an all-day security workshop at the HIMSS Conference in Atlanta Feb. 28 provided me with a good education about what's on the minds of security leaders. For example, one member of the audience said it was a "huge challenge" to ensure that when an employee is fired, their password is promptly deactivated so...
The National Coordinator for Health Information Technology, David Blumenthal, M.D., has added Twitter to his communications arsenal. But how often will he tweet?
A while back, Dr. Blumenthal added "the Health IT Buzz Blog" to his Web site. But his blog entries have been few and far between. Let's hope Dr....
Every year, the Healthcare Information and Management Systems Society's conference offers a crash course on all aspects of applying information technology in healthcare. This year's show, to be held Feb. 28-March 4 in Atlanta, will offer more content than ever on privacy, security, compliance and risk management...
Let's give BlueCross and BlueShield of Tennessee some credit for acknowledging that it has spent more than $7 million so far dealing with the aftermath of the theft of 57 unencrypted hard drives from a call center.
That breathtaking sum makes it crystal clear that potential data breaches have huge business...
Faced with the threat of much stiffer penalties for data security violations and ramped-up enforcement at the federal and state levels, many hospitals are just starting to pay serious attention to security, contends security consultant Kate Borten. But they must go far beyond investing in new technologies to develop...
How do CIOs at community hospitals, which have limited resources, address data security challenges, such as compliance with the privacy and security provisions of the HITECH Act?
Charles Christian, CIO at Good Samaritan Hospital in Vincennes, Ind., also serves as the defacto chief security officer, dividing up...
The number of identity fraud victims increased 12 percent to 11.1 million people in 2009 -- the second consecutive annual increase. At the same time, the total amount of fraud also increased by 12.5 percent to $54 billion.
These are the headlines of the newly-released 2010 Identity Fraud Study by Javelin Strategy &...
Hospitals and other healthcare organizations need to identify data security breaches "in a much more systematic way" to help ensure the privacy of personal information. That's the advice of Lisa Gallagher, senior director for privacy and security at the Healthcare Information and Management Systems...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.