Though IT business application functions and security-focused practices are expected to be integrated as a single process, secure configuration is the management and control of configurations for information systems to enable security and facilitate the management of information security risk.
What is the key to winning financial support from senior executives for an investment in encryption technology? How can encryption be used to mitigate security and privacy risks? And how does encryption fit as a component of an enterprise's risk-management strategy?
This webinar, featuring a security expert who...
BlueCross BlueShield of Tennessee, which experienced a health information breach affecting nearly 1 million individuals in 2009, has completed the encryption of all its stored data.
There was good news and bad news in the reporting of major health information breaches in the past month. The good news: Only four incidents were added to the official federal tally. The bad news: One of those incidents affected 400,000 individuals.
An integrated delivery system in Connecticut is taking the extraordinary step of encrypting its clinical databases before launching an ambitious health information exchange effort.
Beth Israel Deaconess Medical Center in Boston is notifying more than 2,000 of its patients about an unusual potential health information breach incident involving a computer virus that transmitted data to an unknown location.
In a second legal action in the wake of a breach incident involving health insurer WellPoint Inc., a California court has announced preliminary approval of a class action settlement.
In one of the largest health information breaches reported so far this year, Spartanburg Regional Healthcare System in South Carolina has notified 400,000 of an incident involving the theft of a desktop computer from an employee's car.
The Department of Veterans Affairs soon will enable clinicians to use more mobile devices to view patient information, taking several steps to help ensure security.
Many implantable medical devices have wireless connections that enable physicians to monitor patients. But with that wireless connectivity comes the risk of a hacker attack with potentially life-threatening results.
Emerging technology is often touted for enhancing security. But if not properly deployed and integrated, these technologies can hinder rather than improve security.
SafeNet CEO Chris Fedde says top executives, not chief information or chief information security officers, should have final say on what data to encrypt.
If you take a close look at the healthcare information breach "wall of shame," you'll notice that maybe, just maybe, we're making some progress this year.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.