Quantcast
Channel: Intel Health & Life Sciences
Browsing latest articles
Browse All 168 View Live

How to Understand What Sensitive Health Data You Have

With increasing variety, volume and velocity of sensitive patient data, healthcare organizations are increasingly challenged with compliance with regulations and data protection laws, and avoiding...

View Article


Is Your Healthcare Security Friendly?

As recently as 10 years ago, healthcare IT was mostly corporate provisioned, less diverse and there were slower refresh rates. Up to this point, usability was treated as a “nice to have” and...

View Article


How Security Doesn't Always Mean a Trade-Off for Usability in Healthcare

A consequence of the unprecedented rate of advances in technology has brought the topic of usability of devices in the workplace to the fore. Usability used to be a 'nice to have' but with experiences...

View Article

Podcast: Talking Data Security and Privacy in Healthcare

I recently spoke to the Apps Alliance, a non-profit global membership organization that supports developers as creators, innovators, and entrepreneurs, on the latest trends in healthcare security.   It...

View Article

Bring Your Own Device: A Series Focus on EMEA

Today I begin a series of blogs which take an in-depth look at the issues surrounding what is commonly known as ‘Bring Your Own Device’, with a focus on the Healthcare and Life Sciences sector in EMEA....

View Article


Bring Your Own Device in EMEA – Part 2 – Finding the Balance

In my second blog focusing on Bring Your Own Device (BYOD) in EMEA I’ll be taking a look at the positives and negatives of introducing a BYOD culture into a healthcare organisation. All too often we...

View Article

Bring Your Own Device in EMEA – Part 3 – It’s Not Just About Devices

I like to think of security as a chain, and like any other chain it is only as strong as its weakest link. In the case of security in healthcare the chain consists of the network, the server and the...

View Article

BYOD in EMEA – Part 4 - Five Best Practice Tips for Bring Your Own Device in...

I’ve looked at many aspects of Bring Your Own Device in healthcare throughout this series of blogs, from the costs of getting it wrong to the upsides and downsides, and the effects on network and...

View Article


Top 3 Healthcare Security Takeaways from HIMSS 2015

Security was a major area of focus at HIMSS 2015 in Chicago. From my observations, here are a few of the key takeaways from the many meetings, sessions, exhibits, and discussions in which I...

View Article


Security on the Frontlines of Healthcare

  I recently had the privilege of interviewing Daniel Dura, CTO of Graphium Health recently on the subject of security on the frontlines of healthcare, and a few key themes emerged that I want to...

View Article

Healthcare Breaches from Loss or Theft of Mobile Devices or Media

Health and Human Services Breaches Affecting 500 or More Individuals website shows that there were 97 breaches of this type involving 500 or more patients in 2014, and 46 breaches of this type so far...

View Article

Healthcare Breaches from Insider Risks: Accidents or Workarounds?

In my last blog, Healthcare Breaches from Loss or Theft of Mobile Devices or Media, I looked at breaches resulting from loss or theft of mobile devices containing sensitive patient data. In this blog I...

View Article

Healthcare Breaches from Cybercrime

In my last couple of blogs, Healthcare Breaches from Loss or Theft of Mobile Devices or Media and Healthcare Breaches from Insider Risks: Accidents or Workarounds, I looked at breaches resulting from...

View Article


Healthcare Security is Increasingly About Survival

In the wild, no prey is completely safe from predators. However, it is clear to prey which members of the herd are weak or vulnerable to predators. They certainly also know which one is being pursued,...

View Article

6 Most Common Types of Healthcare Data Security Breaches

With all of the media hype around breaches, and pressure from your stakeholders to avoid being the  next headline, it is easy to focus too much on one or another type of breach, perhaps the one that...

View Article

Browsing latest articles
Browse All 168 View Live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>