2017
DOI: 10.1212/con.0000000000000442
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Cybersecurity Risks

Abstract: Cybersecurity issues and their impact on compliance with the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health (HITECH) Act are becoming more of an enforcement focus for a variety of government agencies, including the US Department of Health and Human Services, the Federal Trade Commission, and the Department of Justice. In the case presented in this article, a nurse in a neurology practice opted to speak with a patient about huma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Also proposes and evaluates methods for the dissemination of information.6- Descriptive study [53, 54]- Editorial [14, 51, 52, 55]Information security methodologyDiscusses network security, multifactor authentication, encryption, password protection, updates and others.15- Technical paper [56–58, 60–62, 7173, 106–108]- Summative report [59, 109, 110]Specific types of attacks (i.e. ransomware, phishing, and social engineering attacks)Offers definitions, background information, and recommendations specific to these attack types in the context of hospitals.6- Descriptive study [111, 112]- Editorial [15, 63, 64]- Summative report [69]…”
Section: Resultsmentioning
confidence: 99%
“…Also proposes and evaluates methods for the dissemination of information.6- Descriptive study [53, 54]- Editorial [14, 51, 52, 55]Information security methodologyDiscusses network security, multifactor authentication, encryption, password protection, updates and others.15- Technical paper [56–58, 60–62, 7173, 106–108]- Summative report [59, 109, 110]Specific types of attacks (i.e. ransomware, phishing, and social engineering attacks)Offers definitions, background information, and recommendations specific to these attack types in the context of hospitals.6- Descriptive study [111, 112]- Editorial [15, 63, 64]- Summative report [69]…”
Section: Resultsmentioning
confidence: 99%
“…Although encryption algorithms have a wide range of applications, with the continuous research on large number decomposition technology, people can decompose more and more numbers. The length of the key also increases [29]. Due to the limitations of traditional encryption methods, the choice of large prime numbers becomes difficult and its efficiency is reduced.…”
Section: Key Design Methods Of Encryptionmentioning
confidence: 99%