Giva Blog
Help Desk, Customer Service, Cloud & Security Insights, with a Side of Altruism!

Why This Producer of ID Cards Fell Victim to Data Breach

Newkirk & Healthcare Data Breaches

Newkirk Products, Inc., a company that produces ID cards for health-insurance plans reported a data breach earlier in 2016 involving unauthorized access to a server holding member information. The company reported that no social security, banking, credit card or medical data was stored on the breached server.

[Read More]

Privacy Measures for Healthcare HIPAA Compliance

HIPAA Compliance

Being HIPAA compliant is a must for companies involved in healthcare. In 2009 the U.S. government passed the Health Information Technology for Economic and Clinical Health Act (HITECH) specifically requiring audits by the U.S. Department of Health and Human Services' Office for Civil Rights. There are many ways to ensure that your business is HIPAA compliant, such as having secure software. To do that, raising privacy and security standards is of the utmost importance. Here are a couple of steps you can take to keep your protected health information secure and ready yourself for HIPAA audits.

[Read More]

Healthcare Industry Wants to Increase Cybersecurity

Healthcare Industry Increasing Cybersecurity

The Healthcare industry will forever be the target of cyber attacks due to the wide array of information included in the healthcare record. The 2016 HIMSS Cybersecurity Survey released in August shows that most healthcare executives are elevating data security as a business priority.

The survey asked 150 IT security leaders if they planned to increase cybersecurity awareness, in which case 85 percent of respondents said that they did. The numbers show that data security is an issue of concern for employees who handle information in the US health sector.

[Read More]

Healthcare IT Professionals Making Data Security a Priority

Healthcare Data Security

The health IT spending intentions survey conducted by TechTarget reveals that security is a top priority in the healthcare industry. The healthcare record is a valuable target for hackers and scammers, as it contains personal information, medical history and payment information.

[Read More]

Hospitals Vulnerable to Camouflaged Malware Infiltration

Hospitals & Malware

Data security in the healthcare industry is crucial for patient health and safety. By using camouflaged old malware, cyber attackers have been able to penetrate existing data systems. Old malware using a new identity render these viruses unidentifiable by antivirus systems used in the healthcare industry.

[Read More]

CIO Healthcare Exchange 2016

CIO Healthcare Exchange 2016

Mark your calendars for the CIO Healthcare Exchange, taking place September 25th through the 27th, 2016 in Irving, Texas. At this event, there will be a multitude of discussions focusing on Electronic Health Records (EHR) and how various health organizations have employed EHR through a myriad of models.

[Read More]

The Benefits of Ethical Hacking

Ethical Hacking

Can you imagine a world where hacking was no longer a threat and security was stronger than ever? This is potentially the future of technology if efforts strive to invest time and money into a new generation of so-called "white hat' hackers.

In a recent article on Medical Economics' website, Giva proposes a 5-to-1 ratio of software developers to ethical hackers. This article calls for hefty fees that should be paid to registered ethical hackers for finding weaknesses or gaps in a company's system. Due to the good money opportunity by taking this path, it would persuade those with hacking skills to use their skills to improve technology instead of attacking it. A better future starts with the decision to work for it, and the development of an ethical hacking field is a crucial first step towards a brighter one.

How Mobile Can Help Productivity in Hospitals

Healthcare & Hospital Mobile Technology Apps

Mobile applications have become a part of everyday life, from entertainment to organizational templates, but apps also have immeasurable potential to increase productivity in the workplace. Huffington Post recently published one of Giva's articles, "Using Mobile Applications to Increase Hospital Productivity," to increase awareness of how useful apps can be when they are put to work.

Hospitals are home to arguably the most fast-paced team of professionals because, when lives are in your hands, there is no room for hesitation or delay. If given the opportunity, mobile applications can drastically increase productivity in the hospital front office, back office, and in the Cloud while ensuring clear communication between doctors and patients.

New Ways to Combat Healthcare Data Breaches

Healthcare Data Breaches

Do you feel uneasy writing out all of your personal information in a hospital waiting room? You are not alone and your worry is not without reason. Data breaches are becoming more and more frequent, and identity theft has become a sustainable business that will not be eradicated at any time in the near future.

In Giva's recent article, "Healthcare Data Breaches on the Rise: Implications and Solutions" published by Becker's Health IT & CIO Review, a new solution is proposed in a way which renders the data "valueless" to hackers. The article explains a new system that, once implemented fully, would provide aliases for each patient so that hospitals and healthcare workers can focus on their already-challenging jobs instead of worrying about also protecting vast amounts of Protected Health Information (PHI).

HIPAA Compliance Audits Underway in 2016

HIPAA Compliance Audits

Is your company HIPAA compliant? If you work for a hospital, health care provider, health plan or related business associate, and if your answer is no or unsure, then it is time to get on board because compliance audits are already underway this year. Although there are currently no official HIPAA compliance certifications or programs, there are training companies that offer certification credentials ensuring your company's thorough awareness of the contents of the policies.

[Read More]

 

Newer Entires     1   2   3   4   5   6   7   8   9   10   ...   21     Older Entries