Privacy & Security

Do’s and don’ts for implementing a multi-cloud environment
By Nathan Eddy 12:00 pm August 22, 2019
90% of healthcare organizations plan to use multiple cloud vendors over the next few years. Here’s what they need to know.
Cheap black market PHI drives ransomware, espionage
By Benjamin Harris 11:54 am August 22, 2019
For a few hundred dollars, any hacker can buy their way into a healthcare network.
CISO security tips for managing hybrid cloud deployments
By Mike Miliard 11:45 am August 22, 2019
The complexities of securing a hybrid cloud environment are not to be underestimated as more health systems contend with vendor implementations of all shapes and sizes. One prominent CISO offers tips and best practices.
By Susan Morse 11:35 am August 22, 2019
The IoT: "Every something that comes on the market is in essence its own small computer with an ability to find its way into something."
By Susan Morse 01:13 pm August 21, 2019
Hospitals often don't file for the funds because they're unaware of what can be reimbursed and there is only a 30-day window to apply.
The pros and cons of moving to the cloud for providers
By Nathan Eddy 11:36 am August 21, 2019
Two security experts walk through healthcare cloud computing for provider CIOs, showing how the CIOs must carefully weigh many benefits with potential risks.
Heartbeat monitor
Sponsored
By 10:25 am August 21, 2019
The broad movement of ‘connected devices’ represents a growing cybersecurity threat that puts patient data, medical information, and potentially patient well-being at risk.
By Susan Morse 09:12 am August 21, 2019
A number one recommendation is to know all of the touch points for data: how it comes in, how it's used, where it's stored and how it goes out.
Circuit board
By Jeff Lagasse 04:58 pm August 20, 2019
There is an apparent lack of awareness of federal regulations in both the U.S. and Canada to keep patient information secure.
An identity and access management expert illustrates this critical area of information security and offers tips on how to best control who is accessing protected health information (PHI).
By Bill Siwicki 01:39 pm August 20, 2019
An identity and access management expert illustrates this critical area of information security and offers tips on how to best control who is accessing protected health information.

Most Read

The Daily Brief Newsletter