November 30, 2016

Threats to Patient Data Security From the Board’s Perspective

With a plethora of studies and articles maintaining that the healthcare industry is behind when it comes to security, many healthcare organizations are re-evaluating the resources being used for patient data security. And, of course, the board of directors is very influential when it comes to decisions associated with the privacy and security of patient data.

Continue Reading
November 23, 2016

Meaningful Use, Security Risk Assessments, and HIPAA: How Do They Interact?

Meaningful use of electronic health records (EHRs) has been an important topic in the healthcare world since the federal government introduced the Meaningful Use (MU) Program to encourage healthcare organizations to adopt EHRs. Organizations have had to ensure that they are using certified EHR technology and that they are meeting all the security requirements outlined by the MU guidelines. Let us take a look at the top 5 things you should know about security, privacy, and the MU Program.

Continue Reading
November 16, 2016

Patient Data Irretrievably Lost Due to PHI Breaches

Each month in 2016 has seen substantial PHI breaches, causing an influx of records for sale on the dark web, which is now causing a sudden price collapse. Hacking and ransomware continue to loom large with several instances of patient data irretrievably lost.

Continue Reading
November 9, 2016

Phishing Attacks: A Hacker’s Gateway to Patient Health Records

Over the past few weeks, we focused our “Patients at Risk” series on the various threats that hospital insiders present to patient data. Now, we are shifting our attention to ones stemming from external parties.

Continue Reading
November 1, 2016

More Than Credit Card Fraud: Why Criminal Insiders Commit Health Data Breaches

In our last “Patients at Risk" post, we discussed how insiders can pose a threat to electronic protected health information (ePHI) through health data breaches and explored why hospital leaders identify this group as the top threat to patient privacy. Within this category of insider threats, motivations for snooping can be divided into two main categories: malicious motivation involving criminal activity and innocent motivation involving curious employees with insufficient training on what inappropriate access to the EHR is.  

Continue Reading

Receive the latest article to your inbox