Skip to main content

2012 Healthcare Industry Security Trends

June 01, 2012

Meaningful Use

Many healthcare organizations are struggling with meaningful use. A key area of confusion is the risk assessment. Properly conducting a risk assessment to cover all areas of HIPAA regulations is a key component to address meaningful use. Establishing an ongoing program to ensure compliance is a challenge that has been identified in many healthcare organizations.

Business Associate Assessment

Being compliant within your own organization isn’t enough. Healthcare organizations need to ensure that their business associates are handling PHI according to regulation. With the high number of contractors and outsourcing in the field, these individuals and organizations pose significant risks to the protection of customer information.

Mobile Device Adoption

In 2012, the adoption of mobile devices within the organization is increasingly prevalent. Cinical use of iPads, both corporate and personal (BYOD), is on the rise. Organizations that have previously resisted the use of these devices must embrace them in their organizations. The challenge of securing these devices and managing them is cause for sleepless nights within IT and security departments.  

With this adaptation of mobile devices, the need for mobile application development is increasing. While many organizations may have a solid SDLC in place for traditional application development, these are often bypassed to address the need for immediate mobile application deployment. The risk imposed to an organization can be significant. In our analysis of mobile applications, FishNet Security has seen residual data on devices that could lead to unauthorized access of data.


    6Labs Experts

By: 6Labs Experts

Research and Industry thought leadership

See More

Related Blogs

June 04, 2013

What You Need to Know When Choosing a Managed Security Services Provider (MSSP)

In my initial 6Labs post we covered, ‘How Managed Security Services (MSS) Can Be a “Win-Win-Win” for Small and Mid-Sized Businesses’. We know that man...

See Details

October 17, 2011

Welcome to 6Labs!

Welcome to 6Labs! This first post will be an overview of 6Labs and the industry insight we will provide through this venue. 6Labs is the culmination o...

See Details

March 14, 2018

Observations on Smoke Tests – Part 1

Smoke testing in the traditional definition is most often used to assess the functionality of key software features to determine if they work or perfo...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Related Insights

May 23, 2013

Healthcare Information Security in 2013

This year will be a major milestone for information security in the healthcare industry. The Department of Health and Human Services (HHS) Office of C...

See Details

January 31, 2017

Governance, Risk and Compliance

Learn how to mature and optimize your GRC program and technology investments.

See Details

December 15, 2017

Endpoint Security Assessment

Optiv can help validate the effectiveness of your endpoint security solution by identifying and exploiting vulnerabilities.

See Details

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.