Protected Health Information

Lack of Threat Intelligence Tools Weaken Health Data Security

by Elizabeth O'Dowd

Higher levels of EHR adoption and the increasing amount of data stored digitally make cybersecurity a top priority for health IT infrastructure. However, findings from a recent survey find that most...

Healthcare CIOs Target Data Security, Physician Satisfaction

by Elizabeth O'Dowd

Healthcare CIOs center their focus on data security and physician satisfaction when deciding which mobile technology is most important for their health IT infrastructure, according to a new survey...

Data Theft, Social Engineering Threaten Health IT Networks

by Elizabeth O'Dowd

Healthcare chief information and information security officers indicate data theft and social engineering attacks are top network security concerns, according to new research. A survey conducted by...

What Does Blockchain Mean for Health IT Infrastructure?

by Elizabeth O'Dowd

The healthcare industry continues to explore the value of blockchain technology for improving its approach to security and interoperability. Blockchain could be the future of electronic health...

ONC Final Rule Key to Evolution of Health IT Infrastructure

by Elizabeth O'Dowd

The Office of the National Coordinator for Health Information Technology (ONC) recently issued the final rule updating the Health IT Certification Program to include Enhanced Oversight and...

CMS to Update Infrastructure for Quality Payment System

by Elizabeth O'Dowd

The Centers for Medicare and Medicaid Services (CMS) has selected Okta Identity Cloud to improve security, scalability, and user experience in its build up to the official start of the Quality Payment...

New Data Security Prevents Healthcare Information Phishing

by Elizabeth O'Dowd

Phishing attacks continue to be a significant threat to healthcare data security, and health IT vendors are working on new prevention techniques to combat them. Menlo Security is the latest vendor to...

Virtualization for Secure Healthcare Data Access Control

by Elizabeth O'Dowd

Granting network access and enforcing access protocols are a large part of healthcare network security. Access control keeps unwanted and harmful visitors from gaining access to protected health...