Risks of Mobile Health Apps: Are Health Apps Putting PHI at Risk?
A recent study concluded that many popular mobile health apps pose a risk to protected health information (PHI) security. The study analyzed the security of 30 health apps that [...]
A recent study concluded that many popular mobile health apps pose a risk to protected health information (PHI) security. The study analyzed the security of 30 health apps that [...]
For seven years Florida Healthy Kids Corporation, a Medicaid health plan provider, left its online application platform unprotected, unbeknownst to them. More details on the Medicaid data breach are [...]
Two healthcare organizations recently revealed that employees of their organizations accessed patient records without authorization. Insider healthcare breaches have long plagued the industry, so how can you protect your [...]
Cloud computing allows users to access data stored in the cloud from anywhere with an internet connection. Because of its ease of use, using the cloud to store business [...]
We previously wrote about the new proposed cybersecurity incentive law, HR 7898, that is aimed at making the healthcare industry more focused on keeping patient information secure. But what [...]
In 2020, the Department of Health and Human Services’ (HHS) Office for Civil Rights issued a record 19 fines for failure to comply with the HIPAA regulations. Six of [...]
On January 5, 2021, President Trump signed into law legislation approved by the House Energy and Commerce Committee known as HR 7898. HR 7898, now law, requires [...]
Recent legislation approved by the House Energy and Commerce Committee known as HR 7898 would require the Department of Health and Human Services (HHS) to incentivize a covered entity’s [...]
According to a new study conducted by Black Book Market Research, healthcare breaches are likely to triple in the coming year. With the growing concern surrounding healthcare cybersecurity, the [...]
A new cybersecurity flaw in GE imaging and ultrasound devices was discovered by CyberMDX. The flaw potentially allows unauthorized individuals remote access to the devices. More details on the [...]