Skip to main content

Privacy & Security

Interoperability
By Tom Sullivan | 01:48 pm | October 03, 2018
More than 70 percent of respondents ranked biometrics, such as fingerprinting and facial recognition, as the top choice for a unique identifier while hospital executives raised some questions.
Security
By Jessica Davis | 09:00 am | October 03, 2018
Simulated attacks on a healthcare organization can help infosec leaders assess their security posture, but not all pen testers are created equal and not every provider is ready to be tested.
IT Infrastructure
By Mike Miliard | 09:00 am | October 03, 2018
The prospect of hackers gaining access to remote access to networked IT systems and connected medical devices raises concerns about serious safety risks.
Cybersecurity
By Jessica Davis | 09:00 am | October 02, 2018
Part one of our cyber insurance series focuses on cyber policies and how organizations need to do their homework to ensure they’re covered after a breach.
Cybersecurity
By Jessica Davis | 10:50 am | October 01, 2018
Take our quick survey and we’ll report the results back so you can learn about what your peers are seeing in terms of breaches, hacks and other cybersecurity events. 
Cybersecurity
By Jessica Davis | 10:00 am | October 01, 2018
As seen with Nuance and the Allscripts lawsuit, when a breach or cyber incident occurs – like ransomware or network outage – an organization can face serious ramifications for failing to be transparent about what happened.
Privacy & Security
By Tom Sullivan | 09:30 am | October 01, 2018
New HIMSS Media research outlines hospitals’ top security concerns, ranks ways they’re addressing the problem and pinpoints who builds strategy and policy.
HIE
By Bill Siwicki | 09:00 am | October 01, 2018
This case study looks at a health information network that has gone from zero uniquely identified patients to 7.6 million – and nearly all major health systems statewide are set to participate in its Common Key Service.
04:00 am | October 01, 2018
During October, we talk to infosec executives and experts about the problems and practical steps to securing sensitive data, advice about what to do after a security incident, and a look at emerging trends.
Mobile Health IT
By Tom Sullivan | 10:04 am | September 28, 2018
It's time to think creatively when designing to secure the human rather than securing technology, said the former star of the CBS series Hunted.