Healthcare information security
Healthcare information security
Introduction Information technology is an integral part of healthcare solutions nowadays. The Internet of Things (IoT) concept is already integrated into the
October 11, 2016
Infosec
Healthcare information security
PHI losses: how much and how come? Protected Health Information (PHI) has never been more attractive to cybercriminals. If you analyze the Office for Civil R
October 11, 2016
Infosec
Healthcare information security
Nearly 95 percent of all medical and health care institutions have reported being victimized by some form of a cyber-attack. The recent trend toward digital
September 29, 2016
Infosec
Healthcare information security
The healthcare industry was the number one target for cyber-attacks in 2015, the number of attacks even surpassing those directed at financial organizations
September 29, 2016
Infosec
Healthcare information security
The Internet of Things (often referred to as IoT) is an exciting new development in connectivity and technology that is happening as you read this. Essential
September 28, 2016
Infosec
Healthcare information security
Data breaches continue to be a primary concern for the security of healthcare organizations. Although there will most likely never be a day where the threat
September 28, 2016
Infosec
Healthcare information security
Technology development has been transforming and adding values to healthcare service providers and practitioners. Many technological innovations have been in
September 28, 2016
Infosec
Healthcare information security
There’s no doubt that technology has played a pivotal role in changing our lives, both at home and in the workplace. We are now connected to the world 24 hou
September 27, 2016
Infosec
Healthcare information security
Healthcare professionals do not usually link data security with patient safety. However, when a patient enters a hospital, it becomes the responsibility of t
September 27, 2016
Aroosa Ashraf
Healthcare information security
Data breaches are major threats to hospital security that come in various forms. They include cases involving criminal hackers wanting to steal the protected
September 27, 2016
Aroosa AshrafImplementing Controls for HIPAA
Learn how to maintain the confidentiality, integrity and availability of PHI and ePHI. What you'll learn:- HIPAA models and protocols
- Best practices for controls
- Privacy rule standards
- HIPAA compliance plans
- And more
In this series
- Genetic testing "hottest" new form of health insurance fraud, FBI warns
- Healthcare data security issues: Best security practices for virtual healthcare sessions
- Analysis of ransomware used in recent cyberattacks on health care institutions
- Top cyber security risks in healthcare [updated 2020]
- How to satisfy HIPAA awareness and training requirements
- What Is Protected Health Information (PHI)?
- The Most Vulnerable and Hackable Medical Devices
- How to Comply with HIPAA Regulations – 10 Steps
- 5 Security Awareness Tips for HIPAA Compliance
- How WannaCry Ransomware Crippled Healthcare
- Breach Notification Requirements for Healthcare Providers
- Top 10 Threats to Healthcare Security
- Top 10 Ways Your Healthcare Organization May be Violating HIPAA and Not Know It
- NDG Pt. 3: The Impact of new data security standards and opt-out model on the IG Toolkit
- NDG Pt. 2: Government Views On Opting Out - Health Data and Security in The UK
- NDG Pt. 1: Data security standards and opt-out models in health and social care
- Patient Privacy in Healthcare: A Security Practitioner's Approach
- How Healthy is Security Across Healthcare?
- HIPAA Security Rule
- Regulatory Compliance for HIPAA Security Officers
- HIPAA and IT Security
- A Detailed Look Into the World of Clinical Decision Support Systems
- Top Clinical Application Systems
- Who is Hacking Healthcare?
- Types of hospital information systems
- HIS/HMIS
- The Healthcare IT Stack
- Medical Device Regulation
- Security Risk Assessment in Health Care
- Risk Management in Healthcare
- Security Technologies in Healthcare
- Medical Data Protection
- Healthcare Attack Statistics and Case Studies
- Security Leaders in Healthcare
- The Internet of Things in Healthcare
- Top 5 Emerging Security Technologies in Healthcare
- Emerging Technologies in Healthcare
- 10 Best Practices for Healthcare Security
- IS Best Practices for Healthcare
- Hospital Security
- Security Awareness for Healthcare Facilities
- Hospital security policies & procedures
- What Does Security Awareness Mean for Doctors, Nurses and Hospital Staff?
- Security Awareness for Healthcare Professionals
- Hackable Medical Devices
- Other Healthcare IT Regulations
- HITECH Act and IT Security
- HIPAA Security Checklist
- Healthcare HITECH Act
- HIPAA Overview and Resources
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!