Senior leaders are often faced with tough budget decisions. That's why winning support for an investment in an identity and access management tools requires painting a clear picture of the value to the business.
PeaceHealth, a healthcare system in the Pacific Northwest, has devised a practical way to apply the NIST Cybersecurity Framework to its breach prevention efforts. Learn about the steps involved.
In the struggle to comply with changing regulatory requirements amidst an evolving technological environment, addressing information security can be overwhelming for many healthcare providers. An expert offers tips for sustainable risk management.
While security technologies can help safeguard systems and data, breach prevention and compliance programs also depend on workforce security awareness. Here are some simple steps to take.
Two recent healthcare cases show that the Federal Trade Commission will not hesitate to take action against organizations that fail to protect patient data.
With the White House set to issue its cybersecurity framework next month, a former CIA chief information security information officer vividly explains why the set of best IT security practices won't necessarily protect the nation's critical infrastructure.
Many business leaders lack a clear understanding of the value of identity and access management. CISO Christopher Paidhrin offers a scenario for how to make the case for an IAM investment.
One key way to reduce the risk of a breach is continuous improvement of information security programs. It's dangerous to put security controls in place and then walk away, thinking you're finished, warns security expert Kate Borten.
HIPAA compliance training can play an important role in preventing breaches. But what are the key factors of a successful training program? Security and privacy expert Rebecca Herold offers insights.
Termination of an employee after a breach should be reserved for repeat offenders, individuals who show a total disregard for the rules, those who seek to harm another or the most egregious incidents, security expert Mac McMillan contends.
Breaches are expensive, embarrassing and entice additional scrutiny from regulators and consumers alike. By taking eight key steps, you can protect private information and lessen the impact of breaches when they occur.
What can hospitals and other organizations do to address the security issues associated with biomedical devices? A security expert describes two important steps to take.
Some organizations may need to reconsider how they assess whether incidents are reportable breaches under the HIPAA Omnibus Rule, explains privacy expert Kate Borten.
Reports continue to show that an overwhelming percentage of applications have serious vulnerabilities. The important takeaway here is that application security has not improved in the last 10 years.
Healthcare organizations should take steps to ensure that their medical devices aren't inadvertently exposed to security and patient safety risks on the Internet. Here's how to get started.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.