In The News

In the news
July 27, 2015  |  FierceEMR

NCCoE actually created a laboratory with the scenario of a hypothetical primary care physician using a mobile device in various ways, each of which involves interaction with the physician's electronic health record, such as for referencing lab results. The guide acknowledges that there's been a 125 percent growth in the number of intentional cyberattacks on healthcare organizations over a five year period, and that mobile devices are "especially vulnerable" to such attacks.

In the news
July 27, 2015  |  HealthDataManagement

The National Institute of Standards and Technology has released a draft document aimed at healthcare information security, the first in a new series of guides intended to help enterprises and developers improve cybersecurity.

In the news
July 27, 2015  |  Cyber Security Caucus

The National Cybersecurity Center of Excellence, part of the U.S. Department of Commerce’s National Institute of Standards of Technology, is circulating a draft guidance on best practices for securing healthcare data on mobile devices.

The draft, entitled, “Securing Electronic Health Records on Mobile Devices,” is the first in a planned series of guidances on improving cybersecurity across many industries with the help of standards-based technology, the three-year old center announced.

In the news
July 26, 2015  |  SecureWorld

The National Cybersecurity Center of Excellence (NCCoE) has released a draft for public comment of the first guide in a new series of publications that will show businesses and other organizations how to improve their cybersecurity using standards-based, commercially available or open-source tools.

In the news
July 26, 2015  |  MobiHealthNews

The National Cybersecurity Center of Excellence (NCCoE), a division of the National Institute of Standards and Technology (NIST) has penned a five-part draft guidance on cybersecurity for mobile devices that connect to electronic health records. The guidance includes a step-by-step how-to guide for improving data security that uses commercially available and open source tools and technologies, as well as sections on standards and control mapping and risk assessment.

In the news
July 26, 2015  |  ExecutiveBiz

The National Institute of Standards and Technology‘s National Cybersecurity Center of Excellence is seeking public comment on its draft guide for securing medical and patient information on mobile devices.

NIST said Thursday the “Securing Electronic Records on Mobile Devices” document is the first in a series of publications providing guidance on the use of open source, standards-based or commercially available tools for cybersecurity.

In the news
July 26, 2015  |  iHealthBeat

NIST developed the guidance along with private-sector cybersecurity experts from academia and the private sector (Ravindranath, Nextgov, 7/24).

The guide includes detailed explanations of how health IT professionals can implement security procedures throughout an organization's whole IT system.

In the news
July 26, 2015  |  FierceEMR

The National Institute of Standards and Technology's National Cybersecurity Center of Excellence (NCCoE) has published a new guide to help healthcare providers make mobile devices that use or contain patient electronic health data more secure.

In the news
July 26, 2015  |  HealthcareDive

According to NIST, its draft guide demonstrates how existing technologies can meet anorganization’s need to better protect information in its EHR system. More specifically, it shows how commercially available and open-source tools and technologies that are consistent with cybersecurity standards can help healthcare organizations that use mobile devices share patient health records more securely. 

In the news
July 26, 2015  |  mHealthIntelligence

Incorrect prescriptions or delayed treatment are major concerns when it comes to data security in the healthcare field. As more physicians, nurses, and other providers continues to use smart phones or tablets at work, it grows vital to develop a companywide mobile security strategy.