How to Understand What Sensitive Health Data You Have
With increasing variety, volume and velocity of sensitive patient data, healthcare organizations are increasingly challenged with compliance with regulations and data protection laws, and avoiding...
View ArticleIs Your Healthcare Security Friendly?
As recently as 10 years ago, healthcare IT was mostly corporate provisioned, less diverse and there were slower refresh rates. Up to this point, usability was treated as a “nice to have” and...
View ArticleHow Security Doesn't Always Mean a Trade-Off for Usability in Healthcare
A consequence of the unprecedented rate of advances in technology has brought the topic of usability of devices in the workplace to the fore. Usability used to be a 'nice to have' but with experiences...
View ArticlePodcast: Talking Data Security and Privacy in Healthcare
I recently spoke to the Apps Alliance, a non-profit global membership organization that supports developers as creators, innovators, and entrepreneurs, on the latest trends in healthcare security. It...
View ArticleBring Your Own Device: A Series Focus on EMEA
Today I begin a series of blogs which take an in-depth look at the issues surrounding what is commonly known as ‘Bring Your Own Device’, with a focus on the Healthcare and Life Sciences sector in EMEA....
View ArticleBring Your Own Device in EMEA – Part 2 – Finding the Balance
In my second blog focusing on Bring Your Own Device (BYOD) in EMEA I’ll be taking a look at the positives and negatives of introducing a BYOD culture into a healthcare organisation. All too often we...
View ArticleBring Your Own Device in EMEA – Part 3 – It’s Not Just About Devices
I like to think of security as a chain, and like any other chain it is only as strong as its weakest link. In the case of security in healthcare the chain consists of the network, the server and the...
View ArticleBYOD in EMEA – Part 4 - Five Best Practice Tips for Bring Your Own Device in...
I’ve looked at many aspects of Bring Your Own Device in healthcare throughout this series of blogs, from the costs of getting it wrong to the upsides and downsides, and the effects on network and...
View ArticleTop 3 Healthcare Security Takeaways from HIMSS 2015
Security was a major area of focus at HIMSS 2015 in Chicago. From my observations, here are a few of the key takeaways from the many meetings, sessions, exhibits, and discussions in which I...
View ArticleSecurity on the Frontlines of Healthcare
I recently had the privilege of interviewing Daniel Dura, CTO of Graphium Health recently on the subject of security on the frontlines of healthcare, and a few key themes emerged that I want to...
View ArticleHealthcare Breaches from Loss or Theft of Mobile Devices or Media
Health and Human Services Breaches Affecting 500 or More Individuals website shows that there were 97 breaches of this type involving 500 or more patients in 2014, and 46 breaches of this type so far...
View ArticleHealthcare Breaches from Insider Risks: Accidents or Workarounds?
In my last blog, Healthcare Breaches from Loss or Theft of Mobile Devices or Media, I looked at breaches resulting from loss or theft of mobile devices containing sensitive patient data. In this blog I...
View ArticleHealthcare Breaches from Cybercrime
In my last couple of blogs, Healthcare Breaches from Loss or Theft of Mobile Devices or Media and Healthcare Breaches from Insider Risks: Accidents or Workarounds, I looked at breaches resulting from...
View ArticleHealthcare Security is Increasingly About Survival
In the wild, no prey is completely safe from predators. However, it is clear to prey which members of the herd are weak or vulnerable to predators. They certainly also know which one is being pursued,...
View Article6 Most Common Types of Healthcare Data Security Breaches
With all of the media hype around breaches, and pressure from your stakeholders to avoid being the next headline, it is easy to focus too much on one or another type of breach, perhaps the one that...
View Article