Healthcare information security

Genetic testing "hottest" new form of health insurance fraud, FBI warns

The FBI is finding more and more cases of health insurance fraud. Learn more about it.

Healthcare data security issues: Best security practices for virtual healthcare sessions

With more telehealth and related digital mechanisms to deliver health, healthcare data security standards are more important than ever.

Analysis of ransomware used in recent cyberattacks on health care institutions

Introduction In recent years, there has been a steady increase in the number of ransomware attacks on healthcare institutions. The pressure such institution

Top cyber security risks in healthcare [updated 2020]

The healthcare industry is a prime target for cybercriminals. Stolen protected health information (PHI) is worth hundreds, even thousands of dollars on the b

How to satisfy HIPAA awareness and training requirements

Introduction While data privacy and security regulations abound, few bring the same number of frustrated groans from IT departments as the Health Insurance P

What Is Protected Health Information (PHI)?

Healthcare is a data-rich industry. These data are created across the entire healthcare ecosystem; they represent a wealth of information that can be used to

The Most Vulnerable and Hackable Medical Devices

  The Internet of Things (IoT) adds convenience and capabilities in both personal and professional applications. Smart device usage in the medical field

How to Comply with HIPAA Regulations – 10 Steps

There is a tremendous amount of data in the world of healthcare. That data includes personal healthcare information (PHI), which is regulated by the Health I

5 Security Awareness Tips for HIPAA Compliance

Introduction The Healthcare field generates a lot of information that is very private. To address this issue, Congress passed what was originally known as th

How WannaCry Ransomware Crippled Healthcare

Perspective What do you get when you combine stolen government hacking tools, an unpatched system, and shady operatives from North Korea? The answer is one s