Quantcast
Channel: HealthITSecurity.com » Mobile Security
Browsing all 137 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

New technologies make healthcare security pros more efficient

One of the underlying sayings in IT is “do more with less.” This certainly holds true for the healthcare industry. Over the past few years, administrators have been tasked with creating a more robust...

View Article



Image may be NSFW.
Clik here to view.

HIMSS webcast offers BYOD security reminders

Yesterday’s HIMSS webcast titled “BYOD Enables Clinical Transformation-A Health IT Leader Panel Conversation” brought forward some interesting points about what type of information some vendors are...

View Article

Managing the complexity of securing a large healthcare system

Being responsible for the data security of 25 hospitals sounds like a daunting assignment, especially given the different types of risk, volume of data and variety of end points. But Ron Mehring,...

View Article

Mobile security patent impact on healthcare organizations

Back on Jan. 15, the United States Patent and Trademark Office issued Marble Security U.S. Patent No. 8,356,105, called “Enterprise Device Policy Management“. This type of patent may have an impact on...

View Article

Heyman HospiceCare reports patient data breach

At some point, something has to give – either healthcare employees will encrypt their mobile devices or stop leaving them in their cars. Until then, even if they’re inadvertent, data breaches will...

View Article


Johns Hopkins investigating patient privacy breach

Johns Hopkins is investigating whether patient privacy was compromised by a former gynecologist who was found dead on Monday. Nikita A. Levy, according to the Baltimore Sun, has been accused of...

View Article

HHS mobile security questions for end users

Reading through the mobile security questions that the Department of Health and Human Services (HHS) suggests end users ask of their organizations can help give security officers better perspective on...

View Article

South Carolina HHS data breach update: Indictments dealt

There is new information being reported about one of the early large healthcare data breaches in 2012 that occurred last spring within South Carolina’s Department of Health and Human Services (SCDHHS)....

View Article


Dell Healthcare releases Latitude 10 Enhanced Security Tablet

Dell announced the release today of the Latitude 10 Enhanced Security Tablet today that will target healthcare organizations with dual-factor authentication featuring a card reader and finger print...

View Article


Johns Hopkins privacy breach update: Patient counseling

Last week’s Johns Hopkins patient privacy breach announcement was big news, but the most critical takeaway from the situation may how it plans on restoring patient confidence. The hospital sent a...

View Article

HIMSS13 Preview: CIO, CISO security expectations

HIMSS13 will provide a variety of opportunities for attendees. Networking (and perhaps commiserating) with fellow healthcare executives will be important. Checking out vendors’ latest and greatest...

View Article

HIMSS13 Day One security takeaways

NEW ORLEANS — Day one at HIMSS13 was certainly a busy one and HealthITSecurity.com met with a variety of attendees to lead about new security technologies and endeavors in 2013. TigerText opened the...

View Article

Incoming CHIME CEO discusses CIO security role development

NEW ORLEANS — The College of Healthcare Information Management Executives (CHIME) recently named Russell Branzel its new CEO and he’ll begin that role on April 5. Branzel has a wealth of experience in...

View Article


Image may be NSFW.
Clik here to view.

HIMSS survey: Mobile health security remains chief concern

The 24th Annual HIMSS Leadership Survey, which collected the opinions healthcare provider organizations’ IT pros, was released last week and provided insight into healthcare security concerns,...

View Article

Image may be NSFW.
Clik here to view.

Adapting to wrinkles in your healthcare security strategy

A healthcare CIO can have all of his or her system’s technology and policies in place over a period of time and be somewhat comfortable with the present status of the organization’s security...

View Article


HIMSS13 healthcare security vendor trends: Cloud and BYOD

Two important health IT security trends at HIMSS13 were mobile security and cloud security because of new technology and government rules and regulations such as HIPAA. Both rank fairly high on...

View Article

Healthcare CIO focuses on mobile, virtualization security

HIMSS13 served as a platform for new initiatives and learning about different types of technology for some attendees, but for others the show was an opportunity to further research current projects. Ed...

View Article


Image may be NSFW.
Clik here to view.

Securing healthcare endpoints with thin, virtual technologies

There have been numerous technologies introduced over the past few years that have helped healthcare organizations run more optimally. Now, there is a new focus on the end-user and the endpoints that...

View Article

Health security officer: Data security the key, not devices

Barbara Bartley, Executive Director IT Operations and Information Security Officer of Baptist Health in Montgomery, Alabama, likes to say that she concentrates not on securing devices but protecting...

View Article

Image may be NSFW.
Clik here to view.

Healthcare BYOD trends analyzed in Cisco study

A recent Cisco Partner Network Study titled BYOD Insights 2013 examined 1,000 responses from full-time American employees with smartphones and among the respondents were an unnamed number from the...

View Article
Browsing all 137 articles
Browse latest View live




Latest Images