;

Data Management

Read: HHS Releases Healthcare Cybersecurity Best Practices

HHS Releases Healthcare Cybersecurity Best Practices

The voluntary guidance includes five current threats facing the healthcare industry and ten best practices for mitigating these threats.

Read: Hacked! The 21 Most Devastating Cyber Attacks of 2018

Hacked! The 21 Most Devastating Cyber Attacks of 2018

Here are some of the most serious cyber attacks from 2018, as well as ways to protect yourself and your organization.

Read: HHS: How to Properly Dispose of Electronic Devices with Sensitive Information

HHS: How to Properly Dispose of Electronic Devices with Sensitive Information

HHS issued guidance on the importance of properly disposing of media with sensitive information to prevent potential data breaches.

Read: Primo Wind’s EnergiPlant Solution for Campus Security, Lighting and Data Needs

Primo Wind’s EnergiPlant Solution for Campus Security, Lighting and Data Needs

EnergiPlant is a free standing micro wind system that combines wind, solar and batteries to provide security, lighting and WiFi.

Read: Study: Better IT Security Doesn’t Mean Fewer Hospital Cyberattacks

Study: Better IT Security Doesn’t Mean Fewer Hospital Cyberattacks

A recent study by researchers at the University of Notre Dame looked at 938 data breaches and found institutional factors play the biggest role in the likelihood of hospital cyberattacks.

Read: OCR: Protecting Data Involves Physical Security As Well As Cybersecurity

OCR: Protecting Data Involves Physical Security As Well As Cybersecurity

The OCR’s latest cybersecurity newsletter discusses the importance of physically securing devices with access to ePHI.

Read: Practical Steps to Improve Access Control Maintenance on Campus

Practical Steps to Improve Access Control Maintenance on Campus

Being proactive when it comes to things like database management and firmware/software patches can reduce potential problems in the future.

Read: 5 Steps to Creating a HIPAA-Compliant Cyber Attack Contingency Plan

5 Steps to Creating a HIPAA-Compliant Cyber Attack Contingency Plan

The HHS Office for Civil Rights recommends these steps to develop a cybersecurity contingency plan.

Read: Explaining The HIPAA-HITECH Intersection

Explaining The HIPAA-HITECH Intersection

Here’s two areas of HIPAA-HITECH overlap that healthcare officials MUST understand.

Read: Is The HITECH Act Working? A Summary of its Effect on Healthcare

Is The HITECH Act Working? A Summary of its Effect on Healthcare

Below we summarize the HITECH Act’s success based on the goals of its creators.

1 2 3 7
Get Our Newsletters