Personally Identifiable Information (PII)

See the following -

4 Big Data Threats Health Org’s Are Socially Obligated To Safeguard Against

Carl Ascenzo | Government Health IT | September 20, 2012

The explosion of big data continues as it brings to picture a wealth of information possessed by the healthcare industry including credit card information, personal security details, medical procedures, diagnosis codes, insurance claims and more. Read More »

5 Tips For Cybersecurity Incident Response

Rick Kam | Government Health IT | February 2, 2015

Experts and politicians agree that security and privacy incidents are a given...And as the new cyber-risk handbook from the National Association of Corporate Directors puts it: “If a sophisticated attacker targets a company’s systems, they will almost certainly [be breached].”...

Read More »

A Deeper Look at the Financial Impact of Cyber Attacks

Emily Mossburg | Financial Executives International Daily | December 15, 2015

As large-scale instances of data theft — including theft of credit card records and personally identifiable information (PII) — are becoming more frequent, corporate executives and financial leaders are giving greater attention to the “cost” of cyber breaches. Are they looking at the breach, which typically categorizes data theft, or are they addressing “cost” as it relates to the entirety of the impact of a cyber incident to the enterprise?

Read More »

CISPA Is Back: FAQ On What It Is And Why It's Still Dangerous

Mark M. Jaycox and Kurt Opsahl | Electronic Frontier Foundation | February 25, 2013

The privacy-invasive bill known as CISPA—the so-called “cybersecurity” bill—was reintroduced in February 2013. Just like last year, the bill has stirred a tremendous amount of grassroots activism because it carves a loophole in all known privacy laws and grants legal immunity for companies to share your private information. Read More »

Going Mobile: How Mobile Technology is Evolving in Clinical Trials

Tim Davis | Applied Clinical Trials | May 12, 2014

...[M]obile communication has been leveraged to provide information and access to services across multiple industries, from simple applications such as checking train timetables to mobile banking with secure access to personal information in a highly regulated industry. Clinical research is no exception to this trend and indeed the pharmaceutical industry has seen an increasing movement to leverage mobile technology to engage with patients and collect their data during clinical trials...

Read More »

The Spooky Side of Healthcare Cybercrime and Steps to Protect Your Data

John Trader | Healthcare IT News | October 31, 2012

Although we all applaud the massive push towards electronic health records (EHRs) and the digitization of medical information, there are some very tangible cybercrime data breach threats that exist which could topple the momentum gained by the launch of the Health Information Technology for Economic and Clinical Health Act (HITECH) two and half years ago. Two recently released reports (Verizon’s Data Breach Investigations Report and FireEye’s Advanced Threat Report) suggest that the proportion of healthcare data breaches is rising fast, the largest majority targeting patient personal and payment information (including patient health and insurance data) that attackers can directly or indirectly use to make a profit...

Read More »

Vampire Data And 3 Other Cyber Security Threats For 2013

Mike Miliard | Government Health IT | December 31, 2012

Kroll Advisory Solutions has released its 2013 Cyber Security Forecast, spotlighting some of the pressing and perhaps unexpected privacy and security issues healthcare and other organizations may be grappling with in the coming year. Read More »

Why Healthcare Data Security, Compliance Issues Go Untreated

Dave Brunswick | Health IT Security | August 9, 2016

Secure managed file transfer solutions can be beneficial to covered entities as they work to overcome healthcare data security and compliance issues. If there ever was a pulse of healthcare operations, it’s data. From patient enrollment forms, electronic health records, and health insurance information, the amount of electronic data flowing through the medical community increases every day. With that, healthcare data security must also be a top priority...

Read More »