Certified EHR security falls short, or does it?

Certified EHR security falls short, or does it?

Just how well is patient data protected in today’s certified electronic health records (EHRs)? Not so well according to a recently published report from the Office of Inspector General. But, like many OIG reviews, this one had been “in process” for nearly two years...

read more
IT Security Risk Analysis: Mobile Devices and Apps

IT Security Risk Analysis: Mobile Devices and Apps

In a recent article from Erin McCann, an HP-led study identified that “Internet of Things-type” devices average 25 hidden vulnerabilities and, in Erin’s words, a “whopping” 70 percent of all commonly used mobile devices and apps have these vulnerabilities. Erin...

read more
A Brief CIO Checklist by Brian Evans

A Brief CIO Checklist by Brian Evans

With the growth in technology and the electronic health record (EHR) integrating into the delivery of healthcare, information security is quickly being recognized as an enabler of business. But the continuing concerns about data breaches and regulatory compliance...

read more

Pin It on Pinterest