skip to Main Content
Talk to a Security Expert Now: (800) 721-9177

What Healthcare CEO’s Need to Know about IT Security Risk

Today’s healthcare CEOs are presiding over the most dynamic period in the history of the industry. At the epicenter of this transformative change is the migration to electronic health records (EHR) spurred by the HITECH Act. The resultant investment in information technology (IT) to enable and support EHR’s promises increased access, greater efficiencies, better patient care, and improved outcomes.
Read more

BREACH REPORT 2013: Protected Health Information (PHI)

A total of 804 large breaches of protected health information (PHI) affecting over 29.2 million patient records have been reported to the Secretary of Health and Human Services (HHS) since the August 2009 interim final breach notification rule was issued as a part of the Health Information Technology for Economic and Clinical Health (HITECH) Act.
Read more

BREACH REPORT 2012: Protected Health Information (PHI)

A total of 538 large breaches of protected health information (PHI) affecting over 21.4 million patient records have been reported to the Secretary of Health and Human Services (HHS) since the August 2009 interim final breach notification rule was issued as a part of the Health Information Technology for Economic and Clinical Health (HITECH) Act.
Read more

The Facts About HIPAA, HITECH, and the Omnibus Rule — What You Need to Know

The healthcare industry is rapidly moving towards increasing use of electronic health records (EHR) and other information systems to provide health information to doctors and patients, pay claims, answer eligibility questions, and conduct a host of other administrative and clinically-based functions. More and more health plans are processing electronic claims, and providing online care management as well as other member self-service applications. Along with the rise in the adoption rate of these new technologies comes the risks of potential security breaches of patient medical records and other healthcare information.
Read more

BREACH REPORT 2011: Protected Health Information (PHI)

Breaches of protected health information (PHI) have reached epidemic proportions. While the Federal government regularly reports on the total number of breaches (385) and individuals affected (19 million), our analysis goes beyond the numbers. Redspin's report helps better inform healthcare CIO's and other IT professionals of the nature and most common causes of PHI breach, and recommends preventive measures and corrective action.
Read more

8 Questions to Ask Your Security Auditor

At Redspin, we believe that every organization responsible for maintaining the privacy and security of sensitive data should invest in an independent review of their IT security. How should you choose an independent auditor? How can you be sure you're getting the best security firm for the job? Here are 8 questions you need to ask.
Read more

Ensuring Security, Privacy, and Compliance While creating Value with Healthcare IT

A step by step approach to meeting security, privacy, and compliance goals through a focus on value creation. Spiraling costs and a lack of global competitiveness are often cited as major problems with the U.S. healthcare system. Information technology can be a significant part of the solution to these problems. In fact, industry leaders and the government sector have begun to focus resources, management attention, and funding towards IT investments. Yet historically, IT has been viewed as a cost center rather than as an investment.
Read more
Back To Top