Blog

Stay updated with health data management news and insights shared by the Harmony Healthcare IT team.

Weakest Link

When Attackers Hit Deep and Wide to Target PHI: Cybersecurity...

Does it come as a surprise that in 2018, healthcare led all industries in cybersecurity breaches? Probably...

Jun 05
Data Security image

EHR Replacements Leave Legacy Data Hanging

Chances are, if you’re part of a healthcare organization, EHR system replacement has affected you in some...

May 22
Hacking on the Dark Web

Cybersecurity Update: What Does $1,000 Buy on the Dark Web?

The guise of anonymity has made the dark web a playground for criminal activity. Although true that...

Apr 11
Hackers Attacking Health Info

When Hackers Attack Health Information

Recent CBS news coverage around one individual’s medical identity being compromised after his wallet was stolen continues...

Feb 22
Cybersecurity Haunting Healthcare

Cybersecurity Continues to Haunt Healthcare – Cyber Insurance and a...

Data breaches and insider user threats continue to plague the healthcare industry. Recent stats are a shocking...

Sep 18
10 Privacy and Security Questions to ask your future data archiving partner

10 Things to Know Before You Put Your Trust in...

When migrating personally identifiable information (PII) from one database to another, privacy and security are critical.  Because the...

Aug 27
Secure

Four Tips to Fortify Defenses for Protected Health Information (PHI)

A new report by Verizon claims that healthcare is the worst industry in terms of stopping insider...

May 14
Hacker hacking healthcare

Cybersecurity Best Practices for Small Healthcare Groups

More than four of every five US physicians (83%) have experienced some form of cyberattack, according to...

Apr 26
Ransomware

How One Click Could Shut Down Your EHR

Early cybercrimes of the 1980’s, like the "AIDS" Trojan (also known as "PC Cyborg"), triggered a payload claiming...

Apr 19

Healthcare IT tips, guides, news & more delivered to your inbox

Sign me up