Healthcare November 3, 2015 Protect What You Collect: Keep Protected Health Information Secure 3 min read - If protected health information falls into the wrong hands, it could result in costly medical identity fraud that hurts both patients and insurers.
Healthcare October 15, 2015 ICD-10 and Security: The ICD-10 Transition 2 min read - ICD-10 has finally been released — making it the perfect time for health care organizations to review and revamp security policies.
Healthcare October 8, 2015 Health Care Technology: Time for a Second Opinion on Security? 4 min read - Health care technology is rapidly evolving, but this fast pace and a lack of thorough security puts patient data at risk of loss or theft.
September 24, 2015 Data Breach Syndrome: Poor Prognosis for Health Care? 2 min read - Health care companies are high-priority targets for cybercriminals. Is there some way for health agencies to combat this data breach syndrome?
Software Vulnerabilities September 10, 2015 The Security and Privacy of Wearable Health and Fitness Devices 4 min read - Health and fitness devices that are connected to the Internet of Things can improve quality of life, but they also have security and privacy risks.
Cloud Security July 29, 2015 Health Care Data Breaches and the Cloud: Trick or Treat? 3 min read - Cloud security solutions may be the answer for health care organizations seeking to secure data, but they don't come without risks.
Government July 6, 2015 Medicare Fraud Laws and Common Fraud Schemes 3 min read - Private enterprises can learn a lot from agencies tied to the health care industry, some of which are leveraging analytical tools to curb Medicare fraud.
May 7, 2015 Do No Harm? Medical Device Vulnerabilities Put Patients at Risk 2 min read - Hospitals now rely on medical device technology to improve care outcomes, but are security flaws in these devices putting patients at risk?
Fraud Protection April 29, 2015 How Are You Managing Your Health Care Fraud? 3 min read - Health care fraud is an ever-increasing problem, and organizations must audit and train their employees to make sure their systems can stay secure.
Endpoint April 23, 2015 Medicating Health Care’s Mobile Malware Maladies With Threat Management 3 min read - Labeled vulnerable to cyberattacks such as mobile malware by the FBI, health care organizations need to develop strong mobile security strategies in 2015.