Show All

Apr 6, 2017 10:00:00 AM

Data Security Hygiene Practices for a Healthy Practice

One of the first words that come to mind when I think of medical care is hygiene. Let’s face it, poor hygiene practices in a healthcare provider’s facilities can cause major issues and possible loss of life. Consumers of healthcare services, trust that their provider is taking every precaution possible to protect them from disease or infections that can occur if proper hygiene is not practiced. 

Continue reading >

Topics: Healthcare, Data Security

Mar 17, 2017 9:00:00 AM

From MU to ACI: New Acronym, Same Security Expectations

If you are one of the physicians who thought you could sit back and watch the Meaningful Use train pass by—think again. It’s back. And this time, there is a carrot and a stick.

Continue reading >

Topics: Data Security, Information Security

Sep 1, 2016 11:00:00 AM

Where is Your Data? Why Performing a Data Inventory is Integral in the Digital Age

There’s no denying it—healthcare data has gone digital. The days of paper health records are fast disappearing, and if the Centers for Medicare & Medicaid Services have their way, we won’t be going back. CMS has built meaningful use of electronic health records into its plans for a number of years, and the healthcare industry is responding.

Continue reading >

Topics: Electronic Health Records, Data Security, CMS

Aug 11, 2016 10:00:00 AM

Is Paying the Hacker Your Only Defense?

Recently, I received a call from a close friend who wanted advice because his small company had been the victim of a ransomware attack. A hacker had locked the company out of all significant business applications, compromised all the backups, and wanted $250 in the form of Bitcoins to unlock the system. The IT manager tried to restore the systems without paying and without success.

Continue reading >

Topics: Data Security, Ransomware, Bitcoins

Jul 28, 2016 10:00:00 AM

Hospitals Held Hostage – Extortion by Ransomware

If 2015 was the year of the mega-breach, 2016 has been the year of “ransomware.” Just the sound of the name can send a chill down your neck. So what is it?

Continue reading >

Topics: Data Security, Ransomware, Bitcoins

Oct 30, 2014 11:30:00 AM

Clinical Partners or Barbarians at the Gate? Managing PHI Access

Are you unknowingly giving out the keys to your information kingdom at your health care facility? There is a whole lot of risk that comes with network access and, frankly, many health care facilities could be doing a better job to aggressively protect Patient Health Information (PHI) and manage this important part of security. 

It came out recently that the huge Target breach was linked to network access by a heating/ventilation vendor. By logging in to a payment system this vendor provided an opening for a hacker to access an outside EDI interchange and retrieve stored credit card data. 

Continue reading >

Topics: PHI Security, Healthcare Data, Data Security