Healthcare information security
Healthcare information security
Introduction The healthcare industry consists of a large pool of individuals and entities. There are of course doctors and nurses, but there are also adminis
September 02, 2016
Infosec
Healthcare information security
Introduction Despite concerns over the use of personal devices in the healthcare industry, “bring your own device” (BYOD) is becoming “business as usual.” Nu
June 23, 2016
Infosec
Healthcare information security
Security concerns are growing exponentially in healthcare, as hospitals become the most financially lucrative targets for cyber-attackers. In 2015, one in th
June 22, 2016
Infosec
Healthcare information security
Ransomware, the holding hostage of computers or data in exchange for money, is dramatically on the rise all across the world. Any business in any industry is
June 22, 2016
Infosec
Healthcare information security
Ransomware, the holding hostage of computers or data in exchange for money, continues to be a major threat to hospitals and other medical facilities. In orde
June 17, 2016
Chris Sienko
Healthcare information security
By now, most people have at least some passing familiarity with HIPAA – the federal rules and regulations that apply to the security and handling of personal
June 15, 2016
Infosec
Healthcare information security
It was February 4, 2015, and an announcement that would shake the medical and insurance industries to their core was about to be made. Anthem, Inc., experien
June 11, 2016
Chris Sienko
Healthcare information security
Introduction The use of digital technology in the healthcare sector is growing significantly. Acute care hospitals, health insurance companies, private secto
May 24, 2016
Daniel Dimov
Healthcare information security
Introduction – Why the Healthcare Sector is a Preferred Target for Cyber Attacks IBM dubbed 2015 "the year of the healthcare breach." On the report of the da
May 23, 2016
Dimitar Kostadinov
Healthcare information security
With the drastic increase in Cyber Crime, the healthcare industry is a potential target for data hungry hackers. Patient safety may not directly relate to da
July 27, 2015
Ashiq JAImplementing Controls for HIPAA
Learn how to maintain the confidentiality, integrity and availability of PHI and ePHI. What you'll learn:- HIPAA models and protocols
- Best practices for controls
- Privacy rule standards
- HIPAA compliance plans
- And more
In this series
- Genetic testing "hottest" new form of health insurance fraud, FBI warns
- Healthcare data security issues: Best security practices for virtual healthcare sessions
- Analysis of ransomware used in recent cyberattacks on health care institutions
- Top cyber security risks in healthcare [updated 2020]
- How to satisfy HIPAA awareness and training requirements
- What Is Protected Health Information (PHI)?
- The Most Vulnerable and Hackable Medical Devices
- How to Comply with HIPAA Regulations – 10 Steps
- 5 Security Awareness Tips for HIPAA Compliance
- How WannaCry Ransomware Crippled Healthcare
- Breach Notification Requirements for Healthcare Providers
- Top 10 Threats to Healthcare Security
- Top 10 Ways Your Healthcare Organization May be Violating HIPAA and Not Know It
- NDG Pt. 3: The Impact of new data security standards and opt-out model on the IG Toolkit
- NDG Pt. 2: Government Views On Opting Out - Health Data and Security in The UK
- NDG Pt. 1: Data security standards and opt-out models in health and social care
- Patient Privacy in Healthcare: A Security Practitioner's Approach
- How Healthy is Security Across Healthcare?
- HIPAA Security Rule
- Regulatory Compliance for HIPAA Security Officers
- HIPAA and IT Security
- A Detailed Look Into the World of Clinical Decision Support Systems
- Top Clinical Application Systems
- Who is Hacking Healthcare?
- Types of hospital information systems
- HIS/HMIS
- The Healthcare IT Stack
- Medical Device Regulation
- Security Risk Assessment in Health Care
- Risk Management in Healthcare
- Security Technologies in Healthcare
- Medical Data Protection
- Healthcare Attack Statistics and Case Studies
- Security Leaders in Healthcare
- The Internet of Things in Healthcare
- Top 5 Emerging Security Technologies in Healthcare
- Emerging Technologies in Healthcare
- 10 Best Practices for Healthcare Security
- IS Best Practices for Healthcare
- Hospital Security
- Security Awareness for Healthcare Facilities
- Hospital security policies & procedures
- What Does Security Awareness Mean for Doctors, Nurses and Hospital Staff?
- Security Awareness for Healthcare Professionals
- Hackable Medical Devices
- Other Healthcare IT Regulations
- HITECH Act and IT Security
- HIPAA Security Checklist
- Healthcare HITECH Act
- HIPAA Overview and Resources
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!