What Is PHI, and How Can Healthcare Organizations Keep It Secure?

What Is PHI, and How Can Healthcare Organizations Keep It Secure?

What Is Protected Health Information?According to UC Berkeley’s Human Research Protection Program, PHI includes any information found in medical records or clinical data sets that can be used to identify an individual. In addition, this information must have been collected, used or disclosed while providing a healthcare service. PHI can be used during the diagnosis or treatment of a patient or in clinical research processes.
The HIPAA Privacy Rule and Security Rule require the protection of identifiable health information, such as:
Information collected by doctors, nurses and other healthcare providers in the medical record
Conversations between doctors and other healthcare providers about a patient’s…

Continue Reading
6 Essential Security Controls for Managing East-West Network Traffic

6 Essential Security Controls for Managing East-West Network Traffic

Control 1: Gain Visibility with a Flow Traffic AnalyzerA flow traffic analyzer is a visibility tool capable of reporting normal network traffic flow data for all peripheral devices, along with anomaly detection against known good baselines. Not only do flows provide a convenient unit for traffic measurement, most popular security information and event management solutions accept flows to augment detection capabilities. Capturing contextual data, such as traffic volume, port origination and destination, network path and quality of service — along with who generated what data and when — provides useful information for effective treatment of traffic through policy.
Consequently, an effective access…

Continue Reading