Skip to main content

Security

Security
By Mike Miliard | 11:28 am | June 10, 2020
The tool, developed by scientists at UT Dallas and Vanderbilt, can help weigh the risks that a person might be identified when their health data is shared with researchers.
Security
By Kat Jercich | 03:32 pm | June 09, 2020
Experts say a functioning system should be based on understanding your workforce, your technology and your employee workload – and it should involve everyone in your organization.
Security
By Kat Jercich | 06:28 pm | June 05, 2020
The Exposure Notification Privacy Act requires public health officials to be involved with any exposure notification systems and prohibits commercial use of users' data.
Security
By Kat Jercich | 12:05 pm | June 05, 2020
Big transitions can present an opportunity to enact security improvements, but they can also make a complicated process even more complex.
Security
By Kat Jercich | 11:06 am | June 01, 2020
The telemedicine vendor doesn't store patient data, explained founder Brandon Welch, and relies on peer-to-peer video-calling software working inside browsers to minimize potential vulnerabilities.
Security
By Mike Miliard | 02:53 pm | August 30, 2019
It's not just for clinicians anymore: Security operations center analysts say they're inundated with more and more alerts, and spend too much time sorting through false positives.
Security
By Mike Miliard | 02:58 pm | August 29, 2019
Healthcare information is being more widely shared than ever, but how can that be balanced with the need for robust privacy protections? At Health 2.0, two experts will frame the issue.
Security
By Mike Miliard | 12:45 pm | August 28, 2019
The companies are combining Imprivata's Mobile Device Access technology with the Vocera Collaboration Suite, which can offer faster and more authentication across workstations, virtual desktops and mobile devices.
Security
By Mike Miliard | 12:45 pm | August 22, 2019
The complexities of securing a hybrid cloud environment are not to be underestimated as more health systems contend with vendor implementations of all shapes and sizes. One prominent CISO offers tips and best practices.
Security
By William Scandrett | 05:51 pm | August 16, 2019
Medical devices must be managed from a security perspective, but also from an operational perspective. Using analytics to establish behavior baselines helps support risk assessments, find malfunctions and enhance staff productivity.