Health Insurer can be sued for losing PHI, even if no evidence of misuse.
Court ruling in Data Breach Litigation, illustrates the potential liability - Highlights safeguards such as encryption for laptops with sens
$5.5 million HIPAA settlement shines light on the importance of audit controls
Memorial Healthcare Systems (MHS) has paid the U.S. Department of Health and Human Services (HHS) $5.5 million to settle potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules and agreed to implement a robust corrective action plan. MHS is a nonprofit corporation which operates six hospitals, an urgent care center, a nursing home, and a variety of ancillary health care facilities throughout the South Florida
MEDJACK.3 Poses Advanced Threat to Hospital Devices
A sophisticated zero-day attack through which hackers steal patient data, MEDJACK.3 is leaving medical devices like x-ray machines and MRI s
Department of Homeland Security releases report on Russian Malicious Cyber Activity - Phishing secti
• Implement a Sender Policy Framework (SPF) record for your organization’s Domain Name System (DNS) zone file to minimize risks relating to the receipt of spoofed messages. • Educate users to be suspicious of unsolicited phone calls, social media interactions, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.
Shark Tank's Robert Herjavec notes Healthcare organizations are prime target for cyber attacks
Robert Herjavec is one of the Shark Tank stars. And he is the founder and CEO of the Herjavec Group, a global information security specialist. Herjavec and fellow shark Kevin O’Leary will be giving a keynote on Thursday, Feb. 23, 2017 at HIMSS17 in Orlando. Healthcare IT News asked Herjavec to shed light on the enormous potential for innovation in healthcare, what executives should be doing today in terms of information security, and we asked about the top several technology