Guest interview post from our media partners, iHT2′S blog: Christopher Paidhrin, SCO at PeaceHealth Southwest Med Center in Vancouver, WA shares some of his thoughts and views on healthcare IT security issues Christopher Paidhrin, Security Compliance Officer at PeaceHealth Southwest Medical Center in Vancouver, Wash., took part in the panel discussion “Securing Electronic Personal Health Information (ePHI): From the Data Warehouse to the Point of
Read More
Healthcare Security| Ransomware | Security Breaches | Cyber Attack | News, Analysis, Insights - HIT Consultant
5 Ways to Leverage SSO (Single Sign On) Technology to Drive Meaningful Use
Last year, the Ponemon Institute, a research firm that advises organizations on data security and privacy, released a report revealing that each hospital loses an average $2 million a year in productivity when clinicians can't access electronic health records.
Read More
HIT Security Log Management and Analysis with Alan Brill Pt. 2
Part 2 of the interview/podcast with Alan Brill, Senior Managing Director at Kroll Inc., to discuss the importance of log management & analysis for security in healthcare organizations. Highlights of part 2 of this interview include: Identifying critical areas for potential security breaches Kroll Inc's methodology & approach to security Healthcare Security vs. Other Industry Security Issues Ensuring Security is a priority at your healthcare organization LISTEN NOW USING
Read More
Video:Mobile Device Roundtable:Safeguarding Health Information
Last week, The Office of the National Coordinator (ONC) hosted a Mobile Devices Roundtable with the public, industry, and subject matter experts to discuss how to better safeguard health information while using mobile devices. For those that were not able to attend or watch the webcast, the ONC has now made these videos available to the public. Below is all of the videos from the entire event available to watch in one place. The ONC also invites you to provide input on mobile devices' uses
Read More
Log Management & Analysis in HIT Security with Alan Brill Pt. 1
Importance of log management and analysis in in HIT security in healthcare organizations interview with Alan Brill, Senior Managing Director at Kroll Recently Kroll Inc. has written several articles about the importance of understanding logs as a critical component of investigation security breaches. Acquiring and analyzing logs are critical with incident response and it is highly recommended that healthcare organizations address log management in a proactive manner. HIT Consultant spoke
Read More
Interview Podcast: Healthcare Security Issues in 2012 with Alan Brill Vol. 2
Healthcare security issues in 2012 Interview with Alan Brill, Senior Managing Director at Kroll providing his insight on healthcare security issues Recently the Cyber Security and Information Assurance Division of Kroll Inc. released their annual top 10 security trends for 2012 highlighting the key areas of risks and trends that will impact how organizations and governments combat and respond to cyber threats. In this interview, Alan Brill, Senior Managing Director at Kroll dives deeper
Read More
Healthcare Security Issues in 2012 with Alan Brill Interview Part 1
Healthcare security issues in 2012 Interview with Alan Brill, Senior Managing Director at Kroll providing his insight on healthcare security issues Recently the Cyber Security and Information Assurance Division of Kroll Inc. released their annual top 10 security trends for 2012 highlighting the key areas of risks and trends that will impact how organizations and governments combat and respond to cyber threats. In this interview, Alan Brill, Senior Managing Director at Kroll dives deeper into
Read More
Infographic: How Important is Protecting Patient Privacy?
Infographic highlighting the importance of protecting patient privacy Patient privacy continues to make headlines in the news signifying an epidemic in security breaches in healthcare organizations increasing over 32%in the past year costing an estimated 6.5 billion annually according to a recent study by Ponemon Institute. On Wednesday, a class action suit has been filed seeking as much as 16 million in damages for a data security breach involving the electronic medical records of 16,000
Read More
5 Ways Healthcare Organizations Can Reduce Security Breaches
5 ways healthcare organizations can reduce occurrences of security breaches to combat the growing epidemic of security breaches in healthcare.
Read More
Video: How to Prevent Costly Healthcare IT Security Breaches
It's every CIO's worst nightmare: a laptop computer with patient health information goes missing or is stolen. Not only does this breach jeopardize your patients' privacy, it almost always means costly penalties for your organization. Now, thanks to advancements in anti-theft technology, many CIOs have enabled laptops to protect themselves in these types of situations. The latest anti-theft technology triggers an automatic remote lockdown scenario, or "poison-pill," to keep patient data safe
Read More