Healthcare Information Security Podcast cover art

All Episodes

Healthcare Information Security Podcast — 262 episodes

#
Title
1

How AI Can Help Speed Up Physician Credentialing Chores

2

The Privacy, Security Risks of Connected Health Devices

3

Security Flaws Affect Hospital Pneumatic Tube Systems

4

How Cyber Insurance for Healthcare Entities Is Evolving

5

A Collaborative Approach to Fighting Ransomware

6

The Rising Threats to EHR Data Integrity

7

Supreme Court Ruling in Facebook Case: The Implications

8

Healthcare Risks: Unprotected Databases, 'Shadow IT'

9

Cybersecurity Concerns Among Top Health Tech Hazards in 2021

10

Putting New PACS Guidance to Use

11

Avoiding Medical Device Security Mistakes

12

Building a Ransomware Incident Response Plan

13

Price Is Right: When Insiders Are Willing to Violate HIPAA

14

Essential Security Steps During COVID-19 Crisis

15

Tips on Tackling Medical Device Cybersecurity Challenges

16

Case Study: Community Hospital Tackles Secure Access

17

Bolstering Remote Access Security

18

HITECH Audit: Important Lessons Learned

19

Reducing Business Associate Risks

20

HIPAA Omnibus: Compliance Struggles

21

'Precision Medicine': Privacy Issues

22

Improving Healthcare Application Security

23

Prepping for 2015's HIPAA Audits

24

Is It Time to Amend HIPAA Privacy Rule?

25

Consumers Support EHRs Despite Worries

26

Simplifying Secure Data Exchange

27

HIPAA Ruling: Impact on Breaches

28

Why Ebola Makes HIPAA Training Urgent

29

Medical Device Guide: Why It's Critical

30

CIO: More HealthCare.gov Work Ahead

31

HIPAA Enforcement: The Next Step

32

Apple Watch: The HIPAA Privacy Issues

33

Fixing Broken Data Governance Programs

34

HIPAA Audits: Documentation Is Critical

35

HIPAA Omnibus: The Final Deadline

36

Data De-Identification: Getting It Right

37

Study: EHR-Enabled Fraud Not Widespread

38

Reducing BYOD Risks in Healthcare

39

Why Patient Portal Privacy Is Complex

40

Mostashari on New Healthcare Venture

41

Pritts on ONC's Next Big Privacy Challenge

42

What's the No. 1 Security Blunder?

43

Tips for Role-Based Access Control

44

CIO John Halamka on Security Priorities

45

Preparing for HIPAA Enforcement Actions

46

How Heartbleed Affects Medical Devices

47

How to Keep BA Agreements Simple

48

Securely Linking Regional HIEs Statewide

49

Authentication: Overcoming Reluctance

50

Struggling with Risk Assessments

51

HIPAA Omnibus: BA Compliance Challenges

52

HIPAA Audits: Getting Ready

53

Curing IAM Headaches in Healthcare

54

HIPAA Compliance: Vendor Management Tips

55

HIPAA Audits: 3 Key Topics

56

Why Breach Responses Come Up Short

57

ONC's New Cybersecurity Focus

58

Healthcare: Treating Data Like Lives

59

CIO of the Year Offers Security Advice

60

Cloud Security: Ask The Right Questions

61

Healthcare: Total Network Security

62

Patient Portals: Security Challenges

63

Healthcare in the Cloud: Ensuring Security

64

Insider Threats: A Mitigation Strategy

65

CISOs: Top 3 Challenges for 2014

66

Tips on Preparing for HIPAA Enforcement

67

Safeguarding PHI as a Business Asset

68

Four Threats Facing Medical Devices

69

HHS Investigations: Avoiding Missteps

70

HIPAA Omnibus: Educating Vendors

71

HIPAA Omnibus: What Next?

72

Medical Devices: When to Patch

73

Security Questions to Ask Cloud Vendors

74

Protocol Offers HIPAA Compliance Roadmap

75

Tackling Health IT Patient Safety Issues

76

Beware of HIPAA Compliance Shortcuts

77

Healthcare's Biggest Security Threats

78

Offshore Vendors: Enforcing Compliance

79

Working with HIEs on HIPAA Compliance

80

Policing the 'Data Supply Chain'

81

HIPAA Audits: Documentation Tips

82

HIPAA Omnibus: Compliance Update

83

HIPAA Haggling with Business Associates

84

Why Breach Response Testing Is Critical

85

Telemedicine: Protecting Patient Privacy

86

Addressing Medical Device Security Flaws

87

Building a HIPAA-Compliant Culture

88

Tips for Improving Risk Assessments

89

Securing a Super-Portal for Records

90

Personalized Medicine: Privacy Issues

91

Medical Devices: Mitigating Risks

92

HIPAA Omnibus' Research Provisions

93

Defending Against Insider Threats

94

HIPAA Omnibus: Benefits for Patients

95

Healthcare Data Breaches: The Gaps

96

HIPAA Audits: The Next Round

97

Managing BAs Under HIPAA Omnibus

98

HIPAA Omnibus: Marketing and Fundraising

99

Mobile Security: More Than Encryption

100

HIPAA Omnibus: Tips for Clinics

101

Encryption as 'Default Standard Practice'

102

A CIO Outlines Top Security Priorities

103

National Provider Directory: Why Needed?

104

Building an Authentication Framework

105

Ramping Up HIPAA Training

106

HITECH: Meeting HIE Requirements

107

Data Registry Gives Patients Control

108

Medical Research: Privacy Measures

109

How to Improve Medical Device Security

110

Comparing Medical Devices on Security

111

Evolving Security Challenges for CIOs

112

Making the Right Encryption Decisions

113

Farzad Mostashari: HIE Security Vital

114

Risk Analysis: Avoiding Mistakes

115

A New ID Management Approach

116

Joy Pritts on HIPAA, HITECH Compliance

117

HIPAA Omnibus: Gaps In Privacy?

118

Organized Crime: Threat to Health Data

119

Business Associates and HIPAA Omnibus

120

Cleveland Clinic: Assessing Risks

121

The CIO's Role in Security, Privacy

122

Insights from Cross-Industry Experience

123

HIPAA Omnibus: The Liability Chain

124

HIPAA Omnibus: Business Associate Tasks

125

Privacy Protection: U.S. Falls Short

126

HIPAA Modifications: How to Prepare

127

Essentials of Managing Mobility

128

Ira Winkler on ISSA's Future

129

A Patient Data Matching Call to Action

130

Banks Under Attack: PR Missteps

131

Creating Trust: The $9 Million Pilots

132

Insurance Exchanges: Security Issues

133

HITECH Stage 2: How to Prepare

134

An HIE Structure That Breaks the Mold

135

A CIO Discusses ACO Security Issues

136

Insights Into New Anti-Fraud Effort

137

Why Maine HIE Uses Centralized Model

138

Massachusetts HIE's Security Strategy

139

Halamka Reveals Compliance Priorities

140

Foundation Offers Timely HIE Guidance

141

Building a Health Security Framework

142

HIE Privacy Guidance: An Assessment

143

Tackling HIE Privacy Issues

144

Privacy: Changing a Corporate Culture

145

Stage 2 EHR Incentive Rules: Get Ready

146

Tips for Picking a Data Security Center Site

147

HIEs: Protecting Civil Liberties

148

Winning CEO Support for Info Security

149

7 Steps to Building a Security Program

150

Learning from Zappos Breach Response

151

ACOs Must Safeguard Data Sharing

152

Futurist Questions HITECH's Viability

153

Cloud Computing: A Good Fit?

154

Editor's Choice: 2011 Health Info Security Forecasts

155

HIPAA Enforcement: A 2011 Priority?

156

HealthcareInfoSecurity.com Week in Review for Friday, Dec. 17, 2010

157

Secure Messaging, Remote Access Vital

158

Breach Prevention: Bulletproofing Healthcare Network Security

159

Top Healthcare Security Trends for 2011

160

HealthcareInfoSecurity.com Week in Review for Friday, Dec. 10, 2010

161

HITRUST Framework Update Described

162

HealthcareInfoSecurity.com Week in Review for Friday, Dec. 3, 2010

163

Verizon Outlines Authentication Plans

164

Editor's Choice: Authentication for Health Data Exchange; Governing HIEs a Tough Task

165

HealthcareInfoSecurity.com Week in Review for Friday, Nov. 19, 2010

166

Uniform Privacy Code Vital for HIEs

167

Patient Palm Scans as a Fraud Preventer

168

HealthcareInfoSecurity.com Week in Review for Friday, Nov. 12, 2010

169

Case Study: A Health Record Bank Pilot

170

HealthcareInfoSecurity.com Week in Review for Friday, Nov. 5, 2010

171

Editor's Choice: Top News and Views for October

172

Attorney: Revisit HIPAA Compliance

173

Organ Donor Network Uses Authentication

174

EHR Adopters Need 'Culture of Privacy'

175

Creating EHR Privacy, Security Strategies

176

HealthcareInfoSecurity.com Week in Review for Friday, Oct. 15, 2010

177

HealthcareInfoSecurity.com Week in Review for Friday, Oct. 8, 2010

178

Encryption's Role in Risk Management

179

Editor's Choice: Hiring of CISO Signals New Era; Breach List: Good News, Bad News

180

Using Biometrics Without Single Sign-On

181

HealthcareInfoSecurity.com Week in Review for Friday, Sept. 24, 2010

182

Lessons on EHR Privacy from Europe

183

Authentication at a Small Hospital

184

HITECH Compliance at Rural Hospitals

185

HealthcareInfoSecurity.com Week in Review for Friday, Sept. 17, 2010

186

HealthcareInfoSecurity.com Week in Review for Friday, Sept. 10, 2010

187

How the 'Blue Button' Works

188

Consumer Advocate: Patient Consent Vital

189

HealthcareInfoSecurity.com Week in Review for Friday, Sept. 3, 2010

190

Month in Review: Focus on Security Issues Involved in Social Media, Cloud Computing

191

HealthcareInfoSecurity Week in Review: Aug. 28, 2010

192

EHR Meaningful Use: Security and Privacy

193

HealthcareInfoSecurity.com Week in Review: Aug. 20, 2010

194

HealthcareInfoSecurity Week in Review: Aug. 13, 2010

195

HITECH Compliance: 5 Critical Security Issues

196

HealthcareInfoSecurity Week in Review: Aug. 6, 2010

197

Cloud Computing: Key Security Factors

198

Assessing EHR Vendors on Security

199

Healthcare Security Strategies: Balancing Compliance and Risk

200

Editor's Choice: HIPAA Modifications Top the News

201

HealthcareInfoSecurity Week in Review: July 31, 2010

202

HIPAA Compliance for Business Associates

203

Advice to Regulators: Be Specific

204

HealthcareInfoSecurity.com Week in Review: July 24, 2010

205

HealthcareInfoSecurity.com Week in Review: July 17, 2010

206

Understanding the Proposed HIPAA Revamp

207

HealthcareInfoSecurity Week in Review: July 10, 2010

208

HealthcareInfoSecurity.com Week in Review, July 3, 2010

209

Editor's Choice: June's Top News, Views

210

Mount Sinai's New Smart Card Program

211

HealthcareInfoSecurity Week in Review: June 26, 2010

212

Security Questions to Ask EHR Vendors

213

Security Insights for Physician Groups

214

HealthcareInfoSecurity Week in Review: June 19, 2010

215

EHRs Make Contingency Planning Urgent

216

Why HIEs Must Keep Security Top of Mind

217

HealthcareInfoSecurity Week in Review: June 12, 2010

218

Cloud Computing and Other New Priorities

219

Richard Jankowski of Memorial Sloan-Kettering Cancer Center

220

Fighting Insurance Fraud

221

HealthcareInfoSecurity Week in Review: June 5, 2010

222

Cracking Down on Insurance Fraud

223

HealthcareInfoSecurity Week in Review: May 29, 2010

224

Editor's Choice: May's Top News, Views

225

Telemedicine Raises New Security Issues

226

HealthcareInfoSecurity Week in Review: May 22, 2010

227

How DLP Helps Target Encryption

228

HealthcareInfoSecurity Week in Review: May 15, 2010

229

HIPAA Audit Update: Susan McAndrew

230

HealthcareInfoSecurity Week in Review: May 8, 2010

231

Malpractice Insurer Covers Breach Costs

232

HealthcareInfoSecurity Week in Review: May 1, 2010

233

Editor's Choice: April's Top Healthcare News, Views

234

Breach Notification Rule: The Basics

235

Social Networking: A Physician's Story

236

Breach Notification Planning Tips

237

EHR Risk Management Tips for Physicians

238

HealthcareInfoSecurity Week in Review: April 24, 2010

239

HITECH and Business Associates: Tom Walsh

240

John Glaser on Encryption

241

Emory's Dee Cantrell on Thin Clients

242

Risk Management Techniques: Mark Ford of Deloitte

243

Bill Braithwaite: Beef Up HITECH Rules

244

Insurance Fraud Trends: Dr. Andrea Allmon, FICO

245

Michael Mucha: Risk Management at Stanford

246

Kenneth Bradberry: Risk Analysis Is Never-Ending

247

Terrell Herzig: Intrusion Detection and More

248

David Wiseman: Preparing for HIPAA Audits

249

Todd Fitzgerald: CISO Leadership Skills

250

Michael Frederick: Baylor's Compliance Strategy

251

Rebecca Herold: Use the Right Encryption

252

Dixie Baker: Four Top HITECH Tips

253

After 10 Years, a CISO's Role Evolves

254

Consultant: Hospitals Must Act Now on Security

255

Lisa Gallagher: Ramp Up Breach Detection

256

Dan Rode: Training Key to HITECH Prep

257

Stephanie Reel: Top 10 Data Security Projects at Johns Hopkins

258

William Bria M.D.: Physicians and Data Security

259

Charles Christian: The Security Challenges of Community Hospitals

260

Healthcare Information Security: Getting Beyond Compliance

261

Healthcare Priorities: Dr. Robert Mandel, BlueCross BlueShield of Tennessee

262

Privacy for Patients, Professionals - Nick Mankovich, Philips Healthcare