Privacy & Security

By John Halamka 08:17 am August 11, 2015
For years, manufacturers of medical devices depended on the "kindness of stranger," assuming that devices would never be targeted by bad actors. Hospitals must do their best to isolate medical devices from the internet and from other computing devices that could infect them.
By Scott Rea 06:41 am July 31, 2015
Back in the old days -- say, a whole 10 years ago -- thieves had to be physically inside a healthcare facility to steal patient information. How times have changed.
By Rick Kam 09:26 am July 30, 2015
The dangers of data breach make for great headlines: data held for ransom, financial fraud, medical identity theft. But despite the risks of a breach, the most immediate threat in most security incidents is failure to comply with regulatory requirements.
By Nathan Wenzler 10:03 am July 29, 2015
Ponemon's recently published 2015 Study on Privacy & Data Security of Healthcare Data makes one point crystal clear: healthcare organizations must do more to protect sensitive patient information from the wide variety of data breach threats.
By Mary A. Chaput 09:06 am July 14, 2015
The massive data breach at the Office of Personnel Management has already brought down director Katherine Archuleta and launched a class-action lawsuit by the American Federation of Government Employees. It didn't have to happen.
illustration of locked devices
By Chris Bowen 08:53 am July 08, 2015
Millions of Americans now victims of medical identity theft. Who are the criminals behind this digital era crime wave? A foray into the online black market for stolen data is a surreal experience.
data security lock
By Kurt Hagerman 10:28 am July 07, 2015
Many organizations do a decent job of limiting access to data and systems for their general user population. When it comes to privileged access, however, most simply attempt to limit who has this type of access without considering some inherent risks.
By Adam Winn 10:16 am June 26, 2015
The equipment used in hospitals is often not user-serviceable and therefore often running out-of-date software or firmware. This creates a dangerous situation where devices have vulnerabilities that can be easily exploited by bad actors.
By Gary Glover 10:44 am June 25, 2015
To reduce opportunities for hackers to succeed, healthcare entities must be proactive about protecting sensitive data across their organization. Security must be an ongoing practice and a top priority.
By Jeff Rowe 08:48 am June 25, 2015
Fifty states plus the feds makes 51 sets of privacy rules many healthcare organizations have to take into account as they manage their digital information.

Most Read

The Daily Brief Newsletter