Healthcare IT has dramatically changed over the past few years. With rapid change comes increased IT security risks, yet healthcare spending on IT security is roughly one-fifth of that of comparable industries. Forrester Research reports that "there is enormous pressure to increase security maturity in healthcare."
Today’s healthcare CEOs are presiding over the most dynamic period in the history of the industry. At the epicenter of this transformative change is the migration to electronic health records (EHR) spurred by the HITECH Act. The resultant investment in information technology (IT) to enable and support EHR’s promises increased access, greater efficiencies, better patient care, and improved outcomes.
A total of 804 large breaches of protected health information (PHI) affecting over 29.2 million patient records have been reported to the Secretary of Health and Human Services (HHS) since the August 2009 interim final breach notification rule was issued as a part of the Health Information Technology for Economic and Clinical Health (HITECH) Act.
A total of 538 large breaches of protected health information (PHI) affecting over 21.4 million patient records have been reported to the Secretary of Health and Human Services (HHS) since the August 2009 interim final breach notification rule was issued as a part of the Health Information Technology for Economic and Clinical Health (HITECH) Act.
The healthcare industry is rapidly moving towards increasing use of electronic health records (EHR) and other information systems to provide health information to doctors and patients, pay claims, answer eligibility questions, and conduct a host of other administrative and clinically-based functions. More and more health plans are processing electronic claims, and providing online care management as well as other member self-service applications. Along with the rise in the adoption rate of these new technologies comes the risks of potential security breaches of patient medical records and other healthcare information.
Breaches of protected health information (PHI) have reached epidemic proportions. While the Federal government regularly reports on the total number of breaches (385) and individuals affected (19 million), our analysis goes beyond the numbers. Redspin's report helps better inform healthcare CIO's and other IT professionals of the nature and most common causes of PHI breach, and recommends preventive measures and corrective action.
So you think you need to do penetration testing? Before you embark on testing, it's important to understand exactly how penetration testing fits into your information security program.
At Redspin, we believe that every organization responsible for maintaining the privacy and security of sensitive data should invest in an independent review of their IT security. How should you choose an independent auditor? How can you be sure you're getting the best security firm for the job? Here are 8 questions you need to ask.
A total of 225 breaches of protected health information affecting 6,067,751 individuals have been recorded since the interim final breach notification regulation was issued in August 2009.
A step by step approach to meeting security, privacy, and compliance goals through a focus on value creation. Spiraling costs and a lack of global competitiveness are often cited as major problems with the U.S. healthcare system. Information technology can be a significant part of the solution to these problems. In fact, industry leaders and the government sector have begun to focus resources, management attention, and funding towards IT investments. Yet historically, IT has been viewed as a cost center rather than as an investment.