How to defend against insider threats

How to defend against insider threats

First off, what is an insider threat in healthcare? An insider threat is an individual inside an organization discovered to have been accessing healthcare records without authorization. Healthcare companies must take steps to reduce the potential for insider threats, which is their top source of security incidents.

How HIPAA Impacts Social Media Usage

How HIPAA Impacts Social Media Usage

Social Media can be an effective tool for sharing experiences, building professional connections, and broadcasting conventional healthcare announcements to the public. However, careless posts that have client or patient-specific information could ruin the reputation of any healthcare organization.

Cybersecurity approaches to keep PHI safe

Cybersecurity approaches to keep PHI safe

Healthcare organizations have always kept the possibility of data breaches in mind, especially since 2017 witnessed the biggest and most expensive data breach to date. To counter this, more businesses have hired certified technicians, but that’s not enough.

Top 3 ways to prevent Spectre and Meltdown

Top 3 ways to prevent Spectre and Meltdown

Data security is critical to the healthcare industry. Hospitals and clinics need to ensure medical records are protected at all times to stay HIPAA-compliant. But with Spectre and Meltdown affecting every server, all healthcare providers are at risk of data breach.

Improving healthcare data storage

Improving healthcare data storage

As more medical practices adopt electronic health records (EHR), running out of digital storage is becoming an increasingly common issue. HIPAA-regulated practices don’t always have the option of cloud solutions, but virtualization is a secure and cost-effective alternative.

Are EHRs useful?

Are EHRs useful?

The fact that the world is going digital is unprecedented. With that in mind, the healthcare industry has also decided to embrace the digital trend in the form of EHRs. Short for electronic health records, this new type of data management system aims to improve on traditional paper-based ways.

Key points from Protenus’ new report!

Key points from Protenus’ new report!

In November 2017, healthcare data security and privacy company Protenus released a report on the most common security breaches in healthcare. Here are a few key takeaways.

Insiders are a bigger threat than hackers

Protenus is one of the largest security vendors for electronic health records (EHRs) and their mid-year review sheds some important light on the most common types of security breaches in healthcare.

Mobile devices and HIPAA compliance

Mobile devices and HIPAA compliance

Mobile devices have revolutionized the healthcare industry: They’re convenient and significantly improve work efficiency and patients’ satisfaction. Yet they also come with risks. Patient data handled by those devices can be leaked. That’s why every healthcare provider needs to be extra careful about data security when using mobile devices.

Beware of healthcare IoT security risks

Beware of healthcare IoT security risks

The Internet of Things (IoT) has the potential to completely revolutionize the healthcare industry. Innovations like smart pacemakers and fitness trackers monitor patients’ vitals and unearth patterns that can lead to more accurate diagnoses. But like any new technology, it also brings a slew of security risks healthcare professionals need to address.

Stay on the line with a VoIP continuity plan

Stay on the line with a VoIP continuity plan

Voice over IP (VoIP) phone systems offer far superior mobility, functionality, and cost-efficiency than traditional landlines. But like any computer system, it can be vulnerable to service disruptions, equipment failure, and cyberattacks. With proper preparation, however, your phone systems can weather any disaster.