Risk
1/24/2012
03:49 PM
50%
50%

7 Tools To Tighten Healthcare Data Security

Most of the largest healthcare data security and privacy breaches have involved lost or stolen mobile computing devices. Consider these tools and tips for protecting patient data and managing breaches.
Previous
1 of 7
Next


Smartphones, tablets, and other mobile devices can help facilitate better communication and more extensive patient-caregiver interaction. But they're also easy to lose and more challenging for IT departments to manage.

In fact, mobile devices--including laptop computers, flash drives, and other portable gear--have been involved with some of the largest Health Insurance Portability and Accountability Act (HIPAA) breaches to date affecting 500 or more individuals, according to the Dept. of Health and Human Services, which tracks those incidents on a data breach reporting website that healthcare players have dubbed, the Hall of Shame.

At the same time, healthcare providers have a lot more to lose besides their reputations when it comes to HIPAA violations: Under the HITECH Act, HHS now can impose penalties of as much as $1.5 million annually per organization--per hospital or doc practice--for violating HIPAA privacy rules.

Unfortunately, many of the largest data and security incidents--as well as large HIPAA breaches involving paper documents--have been caused by human error, according to HHS. But besides improving training of staff about best practices for protecting patient data privacy and security--and not allowing any sensitive data to be stored on mobile devices themselves--healthcare organizations can tap an array of vendors' software and other products to safeguard protected health information. Here's a look at some of those tools.

Previous
1 of 7
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2130
Published: 2015-03-05
Cisco Secure Access Control Server (ACS) provides an unintentional administration web interface based on Apache Tomcat, which allows remote authenticated users to modify application files and configuration files, and consequently execute arbitrary code, by leveraging administrative privileges, aka B...

CVE-2014-9688
Published: 2015-03-05
Unspecified vulnerability in the Ninja Forms plugin before 2.8.10 for WordPress has unknown impact and remote attack vectors related to admin users.

CVE-2015-0598
Published: 2015-03-05
The RADIUS implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service (device reload) via crafted IPv6 Attributes in Access-Accept packets, aka Bug IDs CSCur84322 and CSCur27693.

CVE-2015-0607
Published: 2015-03-05
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connecti...

CVE-2015-0657
Published: 2015-03-05
Cisco IOS XR allows remote attackers to cause a denial of service (RSVP process reload) via a malformed RSVP packet, aka Bug ID CSCur69192.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.