Security Risk Assessment: Protecting Patients and Practice

Securing protected health information (PHI) is a goal we all share. Collectively, however, we are relatively clueless about how to achieve this, largely because of the massive amount of technology that almost all of us have adopted. A simple understanding begins with the most basic categorization of the technology that we use to store, transfer, and manage PHI: Software and hardware. Hardware includes all devices (desktops, laptops, routers, EKGs, and mobile devices) that store or …

Read More