888-448-5451 [email protected]
5 hospital security concerns with EHR after Obamacare

5 hospital security concerns with EHR after Obamacare

Obamacare’s provision requiring medical providers to switch from paper records to electronic health records (EHRs) is intended to reduce costs and help patient care, but it could be happening all too quickly for the proper information security measures to be taken to avoid unwanted access to that data.

Secure 20/20 – Interview with Larry Ponemon

NCX Group CEO and Host of Secure 20/20, Mike Fitzpatrick interviews Dr. Larry Ponemon of the Ponemon Institute.  During the interview we discuss Dr. Ponemon’s cutting research on Healthcare Privacy and Security, Application Security and the latest research on...
Reducing infosec costs and breach with continuous monitoring

Reducing infosec costs and breach with continuous monitoring

Do you know what happens when organizations opt to regularly monitor their networks to check the system’s security on an ongoing basis? Find three results from continuous monitoring that all business owners and executives will appreciate; as well as how an enterprise can implement continuous monitoring effectively.

3 Obamacare information security challenges for healthcare

3 Obamacare information security challenges for healthcare

As facilities continue working on their HIPAA compliance requirements, there are more standards executives need to take into consideration and get ready for. This time what affects their everyday work is Obamacare. With Obamacare healthcare data security for individuals and facilities confront at least three challenges: the potential of identity theft, increased risk of vulnerabilities and breach, and breach reporting under HIPAA.

The state of risk-based security management

The state of risk-based security management

A recent study focusing on the state of risk-based security management has found that only 46 percent of IT professionals have deployed continuous monitoring. Furthermore, many organizations that spend on perceived security risks, have not implemented preventive security technologies, and do not use audits often to identify security risks.