Skip to main content

Security

Security
By Mike Miliard | 10:28 am | June 10, 2020
The tool, developed by scientists at UT Dallas and Vanderbilt, can help weigh the risks that a person might be identified when their health data is shared with researchers.
Security
By Kat Jercich | 02:32 pm | June 09, 2020
Experts say a functioning system should be based on understanding your workforce, your technology and your employee workload – and it should involve everyone in your organization.
Security
By Kat Jercich | 05:28 pm | June 05, 2020
The Exposure Notification Privacy Act requires public health officials to be involved with any exposure notification systems and prohibits commercial use of users' data.
Security
By Kat Jercich | 11:05 am | June 05, 2020
Big transitions can present an opportunity to enact security improvements, but they can also make a complicated process even more complex.
Security
By Kat Jercich | 10:06 am | June 01, 2020
The telemedicine vendor doesn't store patient data, explained founder Brandon Welch, and relies on peer-to-peer video-calling software working inside browsers to minimize potential vulnerabilities.
Security
By William Scandrett | 05:51 pm | August 16, 2019
Medical devices must be managed from a security perspective, but also from an operational perspective. Using analytics to establish behavior baselines helps support risk assessments, find malfunctions and enhance staff productivity.
Security
By Eric Bailey | 11:18 pm | May 14, 2017
Jamie Lam, data security compliance manager for the University of California at San Francisco School of Medicine offers tips for managing "shadow IT" as tech-savvy employees find their own ways to work effectively.
Security
By Eric Bailey | 11:13 pm | May 14, 2017
Matt Trevors, a senior member of the technical staff with the CERT Division of the Software Engineering Institute at Carnegie Mellon University, offers help for meeting the HIPAA Security Rule.
Security
10:59 pm | May 14, 2017
Sharon Klein, partner in the Health Sciences Department of Pepper Hamilton, offers tips for audit preparedness, business associate agreements, cyber insurance and more.
Security
By Eric Bailey | 10:50 pm | May 14, 2017
Kim Jones, director of the Cybersecurity Education Consortium at Arizona State University discusses the keys to "transformational security.

Newsletter Signup