All Episodes
Healthcare Information Security Podcast — 262 episodes
How AI Can Help Speed Up Physician Credentialing Chores
The Privacy, Security Risks of Connected Health Devices
Security Flaws Affect Hospital Pneumatic Tube Systems
How Cyber Insurance for Healthcare Entities Is Evolving
A Collaborative Approach to Fighting Ransomware
The Rising Threats to EHR Data Integrity
Supreme Court Ruling in Facebook Case: The Implications
Healthcare Risks: Unprotected Databases, 'Shadow IT'
Cybersecurity Concerns Among Top Health Tech Hazards in 2021
Putting New PACS Guidance to Use
Avoiding Medical Device Security Mistakes
Building a Ransomware Incident Response Plan
Price Is Right: When Insiders Are Willing to Violate HIPAA
Essential Security Steps During COVID-19 Crisis
Tips on Tackling Medical Device Cybersecurity Challenges
Case Study: Community Hospital Tackles Secure Access
Bolstering Remote Access Security
HITECH Audit: Important Lessons Learned
Reducing Business Associate Risks
HIPAA Omnibus: Compliance Struggles
'Precision Medicine': Privacy Issues
Improving Healthcare Application Security
Prepping for 2015's HIPAA Audits
Is It Time to Amend HIPAA Privacy Rule?
Consumers Support EHRs Despite Worries
Simplifying Secure Data Exchange
HIPAA Ruling: Impact on Breaches
Why Ebola Makes HIPAA Training Urgent
Medical Device Guide: Why It's Critical
CIO: More HealthCare.gov Work Ahead
HIPAA Enforcement: The Next Step
Apple Watch: The HIPAA Privacy Issues
Fixing Broken Data Governance Programs
HIPAA Audits: Documentation Is Critical
HIPAA Omnibus: The Final Deadline
Data De-Identification: Getting It Right
Study: EHR-Enabled Fraud Not Widespread
Reducing BYOD Risks in Healthcare
Why Patient Portal Privacy Is Complex
Mostashari on New Healthcare Venture
Pritts on ONC's Next Big Privacy Challenge
What's the No. 1 Security Blunder?
Tips for Role-Based Access Control
CIO John Halamka on Security Priorities
Preparing for HIPAA Enforcement Actions
How Heartbleed Affects Medical Devices
How to Keep BA Agreements Simple
Securely Linking Regional HIEs Statewide
Authentication: Overcoming Reluctance
Struggling with Risk Assessments
HIPAA Omnibus: BA Compliance Challenges
HIPAA Audits: Getting Ready
Curing IAM Headaches in Healthcare
HIPAA Compliance: Vendor Management Tips
HIPAA Audits: 3 Key Topics
Why Breach Responses Come Up Short
ONC's New Cybersecurity Focus
Healthcare: Treating Data Like Lives
CIO of the Year Offers Security Advice
Cloud Security: Ask The Right Questions
Healthcare: Total Network Security
Patient Portals: Security Challenges
Healthcare in the Cloud: Ensuring Security
Insider Threats: A Mitigation Strategy
CISOs: Top 3 Challenges for 2014
Tips on Preparing for HIPAA Enforcement
Safeguarding PHI as a Business Asset
Four Threats Facing Medical Devices
HHS Investigations: Avoiding Missteps
HIPAA Omnibus: Educating Vendors
HIPAA Omnibus: What Next?
Medical Devices: When to Patch
Security Questions to Ask Cloud Vendors
Protocol Offers HIPAA Compliance Roadmap
Tackling Health IT Patient Safety Issues
Beware of HIPAA Compliance Shortcuts
Healthcare's Biggest Security Threats
Offshore Vendors: Enforcing Compliance
Working with HIEs on HIPAA Compliance
Policing the 'Data Supply Chain'
HIPAA Audits: Documentation Tips
HIPAA Omnibus: Compliance Update
HIPAA Haggling with Business Associates
Why Breach Response Testing Is Critical
Telemedicine: Protecting Patient Privacy
Addressing Medical Device Security Flaws
Building a HIPAA-Compliant Culture
Tips for Improving Risk Assessments
Securing a Super-Portal for Records
Personalized Medicine: Privacy Issues
Medical Devices: Mitigating Risks
HIPAA Omnibus' Research Provisions
Defending Against Insider Threats
HIPAA Omnibus: Benefits for Patients
Healthcare Data Breaches: The Gaps
HIPAA Audits: The Next Round
Managing BAs Under HIPAA Omnibus
HIPAA Omnibus: Marketing and Fundraising
Mobile Security: More Than Encryption
HIPAA Omnibus: Tips for Clinics
Encryption as 'Default Standard Practice'
A CIO Outlines Top Security Priorities
National Provider Directory: Why Needed?
Building an Authentication Framework
Ramping Up HIPAA Training
HITECH: Meeting HIE Requirements
Data Registry Gives Patients Control
Medical Research: Privacy Measures
How to Improve Medical Device Security
Comparing Medical Devices on Security
Evolving Security Challenges for CIOs
Making the Right Encryption Decisions
Farzad Mostashari: HIE Security Vital
Risk Analysis: Avoiding Mistakes
A New ID Management Approach
Joy Pritts on HIPAA, HITECH Compliance
HIPAA Omnibus: Gaps In Privacy?
Organized Crime: Threat to Health Data
Business Associates and HIPAA Omnibus
Cleveland Clinic: Assessing Risks
The CIO's Role in Security, Privacy
Insights from Cross-Industry Experience
HIPAA Omnibus: The Liability Chain
HIPAA Omnibus: Business Associate Tasks
Privacy Protection: U.S. Falls Short
HIPAA Modifications: How to Prepare
Essentials of Managing Mobility
Ira Winkler on ISSA's Future
A Patient Data Matching Call to Action
Banks Under Attack: PR Missteps
Creating Trust: The $9 Million Pilots
Insurance Exchanges: Security Issues
HITECH Stage 2: How to Prepare
An HIE Structure That Breaks the Mold
A CIO Discusses ACO Security Issues
Insights Into New Anti-Fraud Effort
Why Maine HIE Uses Centralized Model
Massachusetts HIE's Security Strategy
Halamka Reveals Compliance Priorities
Foundation Offers Timely HIE Guidance
Building a Health Security Framework
HIE Privacy Guidance: An Assessment
Tackling HIE Privacy Issues
Privacy: Changing a Corporate Culture
Stage 2 EHR Incentive Rules: Get Ready
Tips for Picking a Data Security Center Site
HIEs: Protecting Civil Liberties
Winning CEO Support for Info Security
7 Steps to Building a Security Program
Learning from Zappos Breach Response
ACOs Must Safeguard Data Sharing
Futurist Questions HITECH's Viability
Cloud Computing: A Good Fit?
Editor's Choice: 2011 Health Info Security Forecasts
HIPAA Enforcement: A 2011 Priority?
HealthcareInfoSecurity.com Week in Review for Friday, Dec. 17, 2010
Secure Messaging, Remote Access Vital
Breach Prevention: Bulletproofing Healthcare Network Security
Top Healthcare Security Trends for 2011
HealthcareInfoSecurity.com Week in Review for Friday, Dec. 10, 2010
HITRUST Framework Update Described
HealthcareInfoSecurity.com Week in Review for Friday, Dec. 3, 2010
Verizon Outlines Authentication Plans
Editor's Choice: Authentication for Health Data Exchange; Governing HIEs a Tough Task
HealthcareInfoSecurity.com Week in Review for Friday, Nov. 19, 2010
Uniform Privacy Code Vital for HIEs
Patient Palm Scans as a Fraud Preventer
HealthcareInfoSecurity.com Week in Review for Friday, Nov. 12, 2010
Case Study: A Health Record Bank Pilot
HealthcareInfoSecurity.com Week in Review for Friday, Nov. 5, 2010
Editor's Choice: Top News and Views for October
Attorney: Revisit HIPAA Compliance
Organ Donor Network Uses Authentication
EHR Adopters Need 'Culture of Privacy'
Creating EHR Privacy, Security Strategies
HealthcareInfoSecurity.com Week in Review for Friday, Oct. 15, 2010
HealthcareInfoSecurity.com Week in Review for Friday, Oct. 8, 2010
Encryption's Role in Risk Management
Editor's Choice: Hiring of CISO Signals New Era; Breach List: Good News, Bad News
Using Biometrics Without Single Sign-On
HealthcareInfoSecurity.com Week in Review for Friday, Sept. 24, 2010
Lessons on EHR Privacy from Europe
Authentication at a Small Hospital
HITECH Compliance at Rural Hospitals
HealthcareInfoSecurity.com Week in Review for Friday, Sept. 17, 2010
HealthcareInfoSecurity.com Week in Review for Friday, Sept. 10, 2010
How the 'Blue Button' Works
Consumer Advocate: Patient Consent Vital
HealthcareInfoSecurity.com Week in Review for Friday, Sept. 3, 2010
Month in Review: Focus on Security Issues Involved in Social Media, Cloud Computing
HealthcareInfoSecurity Week in Review: Aug. 28, 2010
EHR Meaningful Use: Security and Privacy
HealthcareInfoSecurity.com Week in Review: Aug. 20, 2010
HealthcareInfoSecurity Week in Review: Aug. 13, 2010
HITECH Compliance: 5 Critical Security Issues
HealthcareInfoSecurity Week in Review: Aug. 6, 2010
Cloud Computing: Key Security Factors
Assessing EHR Vendors on Security
Healthcare Security Strategies: Balancing Compliance and Risk
Editor's Choice: HIPAA Modifications Top the News
HealthcareInfoSecurity Week in Review: July 31, 2010
HIPAA Compliance for Business Associates
Advice to Regulators: Be Specific
HealthcareInfoSecurity.com Week in Review: July 24, 2010
HealthcareInfoSecurity.com Week in Review: July 17, 2010
Understanding the Proposed HIPAA Revamp
HealthcareInfoSecurity Week in Review: July 10, 2010
HealthcareInfoSecurity.com Week in Review, July 3, 2010
Editor's Choice: June's Top News, Views
Mount Sinai's New Smart Card Program
HealthcareInfoSecurity Week in Review: June 26, 2010
Security Questions to Ask EHR Vendors
Security Insights for Physician Groups
HealthcareInfoSecurity Week in Review: June 19, 2010
EHRs Make Contingency Planning Urgent
Why HIEs Must Keep Security Top of Mind
HealthcareInfoSecurity Week in Review: June 12, 2010
Cloud Computing and Other New Priorities
Richard Jankowski of Memorial Sloan-Kettering Cancer Center
Fighting Insurance Fraud
HealthcareInfoSecurity Week in Review: June 5, 2010
Cracking Down on Insurance Fraud
HealthcareInfoSecurity Week in Review: May 29, 2010
Editor's Choice: May's Top News, Views
Telemedicine Raises New Security Issues
HealthcareInfoSecurity Week in Review: May 22, 2010
How DLP Helps Target Encryption
HealthcareInfoSecurity Week in Review: May 15, 2010
HIPAA Audit Update: Susan McAndrew
HealthcareInfoSecurity Week in Review: May 8, 2010
Malpractice Insurer Covers Breach Costs
HealthcareInfoSecurity Week in Review: May 1, 2010
Editor's Choice: April's Top Healthcare News, Views
Breach Notification Rule: The Basics
Social Networking: A Physician's Story
Breach Notification Planning Tips
EHR Risk Management Tips for Physicians
HealthcareInfoSecurity Week in Review: April 24, 2010
HITECH and Business Associates: Tom Walsh
John Glaser on Encryption
Emory's Dee Cantrell on Thin Clients
Risk Management Techniques: Mark Ford of Deloitte
Bill Braithwaite: Beef Up HITECH Rules
Insurance Fraud Trends: Dr. Andrea Allmon, FICO
Michael Mucha: Risk Management at Stanford
Kenneth Bradberry: Risk Analysis Is Never-Ending
Terrell Herzig: Intrusion Detection and More
David Wiseman: Preparing for HIPAA Audits
Todd Fitzgerald: CISO Leadership Skills
Michael Frederick: Baylor's Compliance Strategy
Rebecca Herold: Use the Right Encryption
Dixie Baker: Four Top HITECH Tips
After 10 Years, a CISO's Role Evolves
Consultant: Hospitals Must Act Now on Security
Lisa Gallagher: Ramp Up Breach Detection
Dan Rode: Training Key to HITECH Prep
Stephanie Reel: Top 10 Data Security Projects at Johns Hopkins
William Bria M.D.: Physicians and Data Security
Charles Christian: The Security Challenges of Community Hospitals
Healthcare Information Security: Getting Beyond Compliance
Healthcare Priorities: Dr. Robert Mandel, BlueCross BlueShield of Tennessee
Privacy for Patients, Professionals - Nick Mankovich, Philips Healthcare