Skip to main content

Security

Privacy & Security
By Jessica Davis | 10:53 am | August 15, 2018
McAfee researchers show just how easy it is to hack into devices -- but new MedCrypt data shows government guidance may be putting device manufacturers on the right trajectory to shore up this real threat.
Privacy & Security
By Lynne Minion | 12:27 pm | August 13, 2018
She snooped in the EHRs of nearly four dozen people over two years.
IT Infrastructure
By Bill Siwicki | 08:16 am | August 13, 2018
The technology alone won’t fix patient ID issues but it can bring some of the data accessibility, interoperability, integrity and security hospitals need.
IT Infrastructure
By Jessica Davis | 05:29 pm | August 09, 2018
More than 3 million patient records were breached between April and June, highlighting an even bigger issue: Risk increases over time without proper education or reporting.
Compliance
By Mike Miliard | 04:55 pm | August 09, 2018
Company says expanding coverage for Amazon, Google Cloud, Microsoft and others, makes it easier for hospitals to comply with a host of data privacy regulations.
Compliance
By Bill Siwicki | 04:35 pm | August 09, 2018
A new communication process in the emergency department helped the hospital reduce the time it took a patient to get to their new unit by almost half an hour.
IT Infrastructure
By Tom Sullivan | 05:48 pm | August 08, 2018
Making security personal to employees and engaging future generations to rekindle the dwindling talent pool are a good start.
Electronic Health Records
By Jessica Davis | 03:57 pm | August 08, 2018
Security researchers notified the open source EHR managing software of nearly 30 critical vulnerabilities – the second set of vulnerabilities found in a year.
Privacy & Security
By Jessica Davis | 05:28 pm | August 07, 2018
A configuration error left a database filled with healthcare data exposed on the internet, and the data could be accessed and changed by anyone without a password.
Data Warehousing
By Bill Siwicki | 04:56 pm | August 07, 2018
Active training via simulated phishing, progressive disciplinary measures, disabling hyperlinks and document execution from emails are among the suggestions.