Best Practices for Securely Deploying Connected Medical Devices

Medical device security, and the risks associated with those devices is getting increased attention. A recent article in The Hill highlighted the concern the FDA and private industry have regarding these devices. The FDA has issued both pre-and post-market guidance, with goals to improve the […]

LoadingAdd to favorites

How Tech is Changing the Healthcare Customer Experience

A recent Telus international article explored the way big data and tech trends are changing the healthcare customer experience. Specifically, it explored how telemedicine, data driven medical care, the use of wearables and using this technology for clinical benefit, patient-centered care, and patient privacy issues […]

LoadingAdd to favorites

Player Data and Wearable Tech Security and Privacy

In a recent New York Times piece, Marc Tracy discussed the implications of the recent University of Michigan football team’s decision to enter into a contract with Nike worth $170 million dollars. A clause in the contract could allow Nike to collect personal […]

LoadingAdd to favorites

HHS Issues Ransomware Guidance

HHS issued Ransomware guidance recently that clarified that a ransomware attack involving ePHI (electronic Protected Health Information) is a HIPAA breach unless the Covered Entity of Business Associate can demonstrate that there is a low probability that the PHI has been compromised. Ransomware is a […]

LoadingAdd to favorites

OCR Crosswalk Between NIST Cybersecurity Framework and the HIPAA Security Rule

Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity was issued by President Obama in 2013, and called for the development of a voluntary risk-based cybersecurity framework (CSF) that is “prioritized, flexible, repeatable, performance-based, and cost-effective.” In response, the National Institute of Standards […]

LoadingAdd to favorites

Load More