The Government Accountability Office justifies the need for further action, noting that malware variants aimed at mobile devices have risen to 40,000 from 14,000 in less than a year.
The final rules for Stage 2 of the HITECH electronic health record incentive program contain multiple provisions regarding privacy and security. Find out what experts have to say about the merits of the new requirements.
By combining responsible management, risk management and compliance functions and internal audits, organizations will go far in securing their data and systems, says PricewaterhouseCoopers Partner Carolyn Holcomb.
What exactly is continuous monitoring - and why is it so hard for organizations to get it right?
It is one of the most discussed and least understood concepts in enterprise risk management today. Fundamentally, continuous monitoring is about deploying systems to examine all of the transactions and data processed...
In healthcare, financial services and other sectors, information breaches are an epidemic. More than 400 major healthcare breaches have been reported since late 2009. And headline-grabbing breaches in the financial services sector, such as the Sony and Global Payments incidents, illustrate why preventing breaches -...
FTC settlement agreements in two cases involving data exposed on peer-to-peer networks offer a reminder of the risks involved in using the networks. Social Security numbers, healthcare information and other personal details were exposed.
A good way to prepare for federal HIPAA compliance audits is to learn from the experiences of the first organizations audited earlier this year.
This webinar will feature timely insights from a consultant who observed first-hand an audit at a hospital that was one of the 20 initial sites audited under the...
CIO Roger Baker concurs with auditor's recommendations, saying the Department of Veterans Affairs has "embarked on a cultural transformation" and that "securing information is everyone's responsibility."
As we close out one year and begin another, we look back at IT security lessons that emerged over the past 12 months. Here are five that should resonate in the coming year.
Veterans Affairs may have been biased when it awarded last year a high-bid, $133 million IT security services contract to the incumbent provider, the consultancy Booz Allen Hamilton, a VA inspector general audit contends.
Fraud threats have changed little in the past decade. But their global scale has, and James Ratley, president of the ACFE, details how fraud examiners must change their approach to fighting these crimes in 2012.
None of the agencies surveyed by GAO could precisely enumerate the number of IT security personnel they employed. In fact, estimates within agencies varied widely, based on who was reporting and analyzing employment data.
Want more money to spend on your enterprise's information security programs? Deloitte's Mike Brown and Amry Junaideen say IT security managers must show their non-IT bosses how the lack of IT security would adversely affect their operations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.