What Is PHI, and How Can Healthcare Organizations Keep It Secure?

What Is PHI, and How Can Healthcare Organizations Keep It Secure?

What Is Protected Health Information?According to UC Berkeley’s Human Research Protection Program, PHI includes any information found in medical records or clinical data sets that can be used to identify an individual. In addition, this information must have been collected, used or disclosed while providing a healthcare service. PHI can be used during the diagnosis or treatment of a patient or in clinical research processes.
The HIPAA Privacy Rule and Security Rule require the protection of identifiable health information, such as:
Information collected by doctors, nurses and other healthcare providers in the medical record
Conversations between doctors and other healthcare providers about a patient’s…

Continue Reading
6 Essential Security Controls for Managing East-West Network Traffic

6 Essential Security Controls for Managing East-West Network Traffic

Control 1: Gain Visibility with a Flow Traffic AnalyzerA flow traffic analyzer is a visibility tool capable of reporting normal network traffic flow data for all peripheral devices, along with anomaly detection against known good baselines. Not only do flows provide a convenient unit for traffic measurement, most popular security information and event management solutions accept flows to augment detection capabilities. Capturing contextual data, such as traffic volume, port origination and destination, network path and quality of service — along with who generated what data and when — provides useful information for effective treatment of traffic through policy.
Consequently, an effective access…

Continue Reading
IoMT - Internet of Medical Things - Healthcare IT Today Podcast Episode 106

IoMT – Internet of Medical Things – Healthcare IT Today Podcast Episode 106

For the 106th episode of the Healthcare IT Podcast, we are discussing the Internet of Medical Things (IoMT)! First we analyze what IoMT makes us think of and what it includes. Then, we share what devices we’re excited to see come out. Next, we take a look at what the recent explosion of IoMT means for healthcare organizations. And lastly, we debate on the impact IoMT has on security and privacy.
Here’s a preview of the questions and topics we discuss in this episode:

What do you think of when you see the term IoMT?
Are there devices or categories of devices that you…

Continue Reading