With increasing federal scrutiny of health care data breaches, maintaining a secure network and clinical infrastructure is crucial for both payers and providers. Topics here include: data breaches, data encryption and other security techniques, access and authentication issues, and regulatory requirements.
The explosion of networked medical devices and sensors that connect, communicate or transmit information through the Internet hold tremendous promise if security is built into the infrastructure from the outset, according to a new report.
As with other stages of the electronic health records meaningful use program, the initial iteration of Stage 3 that was published as a proposed rule on March 20 includes an objective to protect electronic protected health information.
Advantage Dental, serving more than 200,000 residents across Oregon through 30 clinics, notified 151,626 patients of a breach of protected health information within 30 days after an internal database was hacked.
Draft congressional legislation to create a national standard on data security and breach notification does not address healthcare data, leaving consumer health information vulnerable, according to the Federal Trade Commission.
Hackers succeeded in accessing claims and clinical data from Premera, but they may be wasting their time trying to monetize health data, industry observers say.
Premera Blue Cross in Mountlake Terrace, Wash., discovered on January 29, 2015 a cyberattack on its information systems. Following an investigation during which it learned the attack initially hit on May 5, 2014, the insurer now is notifying about 11 million affected individuals.
Were now eating the exhaust of the massive Anthem breach and predictably, a Google search serves up hundreds of commentary pieces about this being the wake-up call, the call to arms, a turning point for healthcare data security.
Home health and hospice provider Amedisys is notifying more than 6,900 individuals of a breach of protected health information, even though the PHI is encrypted.
Bipartisan legislation to ease the sharing of cyber threat information among industries and the federal government has easily cleared the Senate Select Committee on Intelligence and now moves to the Senate floor for consideration.
HITRUST, a healthcare industry stakeholder coalition to improve cybersecurity, has created a De-Identification Framework, offering guidance, standards and controls to better understand the processes of de-identifying data.
Blue Cross Blue Shield of Michigan in 2012 learned of a large scale identity theft scheme, but with the recent filing of indictments only now has been authorized by law enforcement agencies to announce the breach of protected health information and notify 5,514 members.
St. Marys Health in Evansville, Ind., recently notified about 4,400 individuals following a hacking attack on some employee email accounts.
With vendors such as Apple, Fitbit, Microsoft and Nike bringing wearable technologies to market, industry analysts are predicting explosive growth for these devices over the next few years-and not just with consumers. Physicians are seeing the devices as a way to better manage patient care.
Despite suffering a recent hacking attack that left the personal information of nearly 80 million people vulnerable to identity theft, health insurer Anthem Inc. is refusing to comply with a security audit from the U.S. Office of Personnel Managements Inspector General.
Based on a three-month review of cyber risk management for the healthcare industry, the Health Information Trust Alliance concludes that todays approach to cybersecurity is predominantly reactive and, for the vast majority of organizations, inefficient and labor-intensive.