The CIO for the Medicare and Medicaid programs and the leader of the federal incentive program for electronic health records are among many speakers who will address data security at the Healthcare Information and Management Systems Society Annual Conference.
A new 60-page white paper offers insights on how to ensure the integrity of patient identifiers used in electronic health records despite the lack of a national standard for such identifiers.
I'm sorry, but weren't we just celebrating the holidays?
Unbelievable how fast the New Year has flown by already. It seems like we're all trying to get 12 months worth of work done in one.
What if your fraud detection solution could teach itself to identify new fraud patterns? That's adaptive modeling. A "bolt-on" adaptive modeling layer works as a secondary analytic layer with fraud detection systems that use past transactional and case disposition data to significantly improve fraud detection. The...
There's been a lot of talk about identity theft over the past year, and there's certainly been a lot of political buzz about healthcare. But what about medical identity theft? Now that's a topic about which we don't hear nearly enough.
Malicious criminal attacks have doubled, and the average cost of a data breach has increased to $204 per compromised record.
These are the headlines from the 5th annual "Cost of a Data Breach" study by the Ponemon Institute.
What's the cost of a data breach?
The Ponemon Institute is out with its 5th annual "Cost of a Data Breach" study, and in an exclusive interview Dr. Larry Ponemon discusses:
The current cost of a data breach - and how it's risen since 2009;
Data breach trends across industry;
What organizations should do to...
From ATM skimming to the Zeus malware, credit and debit cards are under increased attack by fraudsters, and organizations need to step up their efforts to protect their customers - and themselves. What steps can you take to avoid being the next payment card fraud victim?
Join Kimberly Peretti, former senior...
Malware is increasingly sophisticated, and social media are the common new venues for attacks.
These are the headlines from the latest Cisco Annual Security Report. Patrick Peterson, Cisco senior fellow, offers highlights of the report, discussing:
Top trends and threats;
The risks to specific vertical...
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber warfare.
Interview with Jay Foley of the Identity Theft Resource Center
Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010. This is the warning from Jay Foley, executive director of the Identity Theft Resource Center.
Malware is increasingly sophisticated, and social media are the common new venues for attacks.
These are the headlines from the latest Cisco Annual Security Report. Patrick Peterson, Cisco senior fellow, offers highlights of the report, discussing:
Top trends and threats;
The risks to specific vertical...
This white paper describes the three major areas of value delivered by FICO Insurance Fraud Manager: prepayment savings from avoiding unnecessary and excessive payments, systemic savings from identifying and correcting policy weaknesses, and postpayment savings from identification of suspicious providers.
FICO...
Interview with Jay Foley of the Identity Theft Resource
Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010.
This is the warning from Jay Foley, executive director of the Identity Theft Resource Center. In an exclusive...
Interview with Wade Baker and Alex Hutton of Verizon Business
Earlier this year, Verizon Business unveiled its much-heralded 2009 Data Breach Investigations Report.
Now, the company has just released its 2009 Supplemental Data Breach Report, which reveals the 15 most common attacks against organizations.
In...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.