BYOD in EMEA – Part 4 - Five Best Practice Tips for Bring Your Own Device in...
I’ve looked at many aspects of Bring Your Own Device in healthcare throughout this series of blogs, from the costs of getting it wrong to the upsides and downsides, and the effects on network and...
View ArticleTop 3 Healthcare Security Takeaways from HIMSS 2015
Security was a major area of focus at HIMSS 2015 in Chicago. From my observations, here are a few of the key takeaways from the many meetings, sessions, exhibits, and discussions in which I...
View ArticleSecurity on the Frontlines of Healthcare
I recently had the privilege of interviewing Daniel Dura, CTO of Graphium Health recently on the subject of security on the frontlines of healthcare, and a few key themes emerged that I want to...
View ArticleHealthcare Breaches from Loss or Theft of Mobile Devices or Media
Health and Human Services Breaches Affecting 500 or More Individuals website shows that there were 97 breaches of this type involving 500 or more patients in 2014, and 46 breaches of this type so far...
View ArticleHealthcare Breaches from Insider Risks: Accidents or Workarounds?
In my last blog, Healthcare Breaches from Loss or Theft of Mobile Devices or Media, I looked at breaches resulting from loss or theft of mobile devices containing sensitive patient data. In this blog I...
View ArticleHealthcare Breaches from Cybercrime
In my last couple of blogs, Healthcare Breaches from Loss or Theft of Mobile Devices or Media and Healthcare Breaches from Insider Risks: Accidents or Workarounds, I looked at breaches resulting from...
View ArticleHealthcare Security is Increasingly About Survival
In the wild, no prey is completely safe from predators. However, it is clear to prey which members of the herd are weak or vulnerable to predators. They certainly also know which one is being pursued,...
View Article6 Most Common Types of Healthcare Data Security Breaches
With all of the media hype around breaches, and pressure from your stakeholders to avoid being the next headline, it is easy to focus too much on one or another type of breach, perhaps the one that...
View Article