Health IT Data Security

Internet Explorer Vulnerability: Steps To Take

Posted on by Frank J. Rosello

Faced with a vulnerability that exposes Microsoft’s Internet Explorer Web browser to a zero-day exploit involved in recent targeted attacks, CISOs need to take prompt action, security specialists say. That includes communicating the vulnerability to end users, using alternate Web … Continue reading

Posted in Health IT Data Security | Tagged , , , , , , , , | Leave a comment

Why Does Healthcare Resist Encryption Technology?

Posted on by Frank J. Rosello

The most basic security truth in 2014 is that encryption done properly — a high enough level of encryption, proper safeguarding of the encryption key — is the best thing an IT department can do. Sill, many industries resist encryption … Continue reading

Posted in Health IT Data Security | Tagged , , , , , , , , , | Leave a comment

PHI Data Breaches Makes Top Five Security Concerns For 2014

Posted on by Frank J. Rosello

Every year, Coalfire, an IT governance, risk and compliance firm, names its top 5 information security and compliance predictions for the new year. And this time around, healthcare data breaches made the cut. The prediction? Expect a huge increase of … Continue reading

Posted in Health IT Data Security | Tagged , , , , , , , , , , , , , | Leave a comment

Patient Portal Security Considerations

Posted on by Frank J. Rosello

As healthcare facilities launch their own patient portals, technology is only the first step. Administrators are learning that decisions need to be made on everything from patient login protocols to support for patient record revisions. HIPAA regulations, always a primary … Continue reading

Posted in Health IT Data Security | Tagged , , , , , , , , , , , , , , , | Leave a comment

NIST To Review Data Encryption Processes Following NSA Allegations

Posted on by Frank J. Rosello

The National Institute of Standards and Technology—bedeviled by persistent allegations that its internationally recognized data encryption standards have been compromised by the National Security Agency—announced Friday it will undergo internal and independent formal reviews of its standards development processes for … Continue reading

Posted in Health IT Data Security | Tagged , , , , , , , , , , , , , , | Leave a comment
Follow GOEILLC on LinkedIn Follow GOEILLC on Twitter