Organized crime has targeted healthcare organizations for insurance fraud scams. What are the risks? What are the solutions?
Dr. Andrea Allmon, senior director with FICO, discusses:
Insurance fraud trends;
How organizations are most vulnerable;
What to do now to reduce fraud today.
Allmon is responsible for...
A federal agency will survey U.S. consumers on their attitudes toward electronic health information exchange and related privacy and security issues.
The Office of the National Coordinator for Health Information Technology within the Department of Health and Human Services announced in the Federal Register March 19...
Interview with Dawn Cappelli of Carnegie Mellon University's Software Engineering Institute
Insider crimes are among the biggest threats to public and private sector organizations. And yet too many groups continue to struggle to prevent or even detect these crimes.
In an exclusive interview, Dawn Cappelli of...
By transitioning from information security into law, Patrick Mueller took advantage of an opportunity many information security professionals now see: The chance to leverage practical experience in a growing legal field.
Although many healthcare organizations are making broader use of encryption, they're typically taking a "wait and see" approach to encrypting their clinical databases, citing serious concerns about an adverse impact on performance.
Two consultants, however, argue that hospitals and clinics can apply encryption on...
When it comes to protecting your organization and your customers from a data breach, what is considered "reasonable security?"
This question is at the center of several ongoing lawsuits, and how the courts answer it may be one of the biggest stories of 2010.
Shedding light on this hot topic is David Navetta,...
With the highest unemployment in more than 20 years and competition dense for open positions, the pressure is on for job seekers to have flawless interview skills - especially within information security.
Although there's plenty of talk about cybersecurity threats involving devious international hackers, the real threat to the security of healthcare information, I believe, is staff members who aren't paying enough attention to the little details. The Gartner Group's John Pescatore said it well in a recent interview:...
A risk analysis should not be an annual event, but rather an ongoing process that's revisited whenever a healthcare organization adds or changes any application. That's the advice of Kenneth Bradberry, vice president and chief technology officer at ACS, a consulting firm recently acquired by Xerox.
The Healthcare Information and Management Systems Society is asking federal regulators to be much more specific about the information security requirements within the proposed "meaningful use" rule for the electronic health record incentive payment program.
The Medical Group Management Association and the American Medical Association offer very different assessments of the proposed security provisions in the "meaningful use" rule for the federal electronic health record incentive program.