Tag Archives | PHI

Orlando Hospital Foots the Bill Post Data Breach

After the Pulse nightclub incident in Orlando, FL, a majority of the victims were treated at Orlando Regional Hospital. Not too long after their treatment, the hospital suffered a data breach, which included those victims’ PHI. Here’s what happened: Survivors of the Orlando shooting at the Pulse LGBT club will not be billed for their […]

Read full story Comments { 0 }

Is Medical Identity Theft on The Rise?

The threat of medical identity theft is becoming a far bigger threat than initially expected, and it’s on the rise. And to make things even worse, patients can’t effectively take matters into their own hands because, in most states, medical identities belong to the provider or hospital. It began like an ordinary purse snatching. The […]

Read full story Comments { 0 }

Global Cost of Cyber Crime to Hit $6 Trillion in 2016

The global cost of cyber crime, according to a recent study by Cybersecurity Ventures and the Ponemon Institute, could reach $6 trillion before the end of 2016. While $6 trillion may seem a little high, more than a trillion isn’t unlikely either. A report out by Cybersecurity Ventures predicts global annual cybercrime costs will grow […]

Read full story Comments { 0 }

The Value of Protected Health Information for HIPAA Privacy

How much is your information worth?  How much is your SSN worth?  How much is your medical ID number worth?  These are the type of questions the PHI Protection Network is helping organizations answer because if you don’t know the value of your assets, how can you make the proper investment to protect them.  Computers, […]

Read full story Comments { 0 }

Compliance as a False Security Strategy

Dr. Cris Ewell, who we’ve talked  about before and before, has a great profile in the recent Data Breach Examiner.  In it, he talks about the need to look past “compliance” as the end all of security and privacy strategies in healthcare organizations. “Breach happens. That’s the operative assumption that Dr. Cris Ewell lives by. […]

Read full story Comments { 0 }

EHR’s and Patient Privacy – The Ongoing Battle

EHR’s and Patient Privacy – The Ongoing Battle: “Does your dermatologist need access to your reproductive health history? Can you limit access to the psychiatric notes in your chart once they have been entered into your provider’s new electronic health record (EHR) system? It sounds absurd, but the adoption of EHRs and health information exchanges […]

Read full story Comments { 0 }

Healthcare data breach: 55k patients compromised

If I had a dollar every time some health employee gets a laptop stolen out of his or her car…I’d go to the casino.  Good thing the car was locked! “As reported by the Indiana Business Journal, the laptop was taken from an employee’s locked vehicle on July 19. Group officials said the laptop contained […]

Read full story Comments { 0 }

Data Breach: Before, During and After

When it comes to minimizing risk before, during and after a data breach, having a proper incident response plan in place, which has been tested and proven, is key.  During a recent AHA webinar it was revealed that 44% of healthcare respondents did not have an incident response plan.  But a good incident response plan […]

Read full story Comments { 0 }

Reorganized privacy, security teams speed data breach response

Healthcare Informatics has a nice article about Henry Ford Health System, a four hospital system in Michigan, and their challenging experiences with data breach response plans.  Meredith Phillips, chief privacy officer for the system, explains a before and after response plan. “Working with ID Experts, HFHS crafted a new approach to breach response. Under the […]

Read full story Comments { 0 }

When a Data Breach Isn’t a Data Breach

Earlier this summer The Surgeons of Lake County experienced a data breach that might have scary tellings for the future.  Hackers breached their EHR system and instead of download the “payload” they encrypted the data in place, holding the key for ransom.  This data breach doesn’t look like the normal data breaches we have seen. […]

Read full story Comments { 0 }