Talk With an Expert

Breach Control: Best Practices in Health Care Application Security

Breach Control: Best Practices in Health Care Application Security (PDF, 2.86MB)Published: 25 Feb, 2016
Created by:
Brian Quick

The risk of protected health information (PHI) being stolen has grown exponentially within the past year. Business associates, covered entities and the health care workforce as a whole must comply with HIPAA and HITECH data protection mandates despite the influx of electronic health records (EHR) from interoperability initiatives. This paper will discuss the threat landscape for patient medical devices and personal mobile devices. This paper will also discuss best practices in application security as part of the Software Development Lifecycle (SDLC).

Breach Control: Best Practices in Health Care Application Security