Today, healthcare organizations and their partners outside of healthcare need to tightly control access to data. Why?
Tougher government requirements
Tougher patient data management regulations
The risk of data breaches
The increase in legal actions
This Quest Software white paper explains the critical...
The HITECH Act provides substantial financial incentives to hospitals and physician groups that become meaningful users of electronic health records. But to qualify, they must conduct a detailed risk assessment.
Join us for this exclusive session where you'll receive:
An analysis of what the HITECH risk...
The level of application security threats is rising, but the level of response is not. "That's a serious disconnect," says Jeff Williams, chair of the OWASP Foundation.
There are new dynamics shaping privacy and the privacy profession today, and ultimately there are new skills demanded from professionals to successfully embrace the future.
Healthcare organizations need to improve the methods they use to objectively assess the severity of a security incident and whether it should be reported to comply with the HITECH Act's breach notification rule, one privacy officer says.
Two weeks after authorities on two continents arrested cyber criminals linked to the Zeus malware, Microsoft has added the infamous Trojan's signature to one of its best removal tools in an effort to hunt down infected machines.
Zeus, now in its eighth generation, is striking businesses and financial institutions throughout the world, and it's suspected to be the malware behind recent attacks on mobile devices.
Hospitals and clinics need to take a methodical approach to privacy and security as they prepare to qualify for electronic health records incentive payments from Medicare and Medicaid under the HITECH Act, security adviser Phyllis Patrick says.
As healthcare organizations make broader use of wireless networks and devices, they must develop an aggressive risk management plan to address security threats, says security expert Rebecca Herold.
The emergence of Bugat is an attempt by cyber criminals to diversify their attack tools, using a platform that is similar to Zeus, but harder to detect.
Medicare and the Department of Veterans Affairs have formally launched "blue button" projects that enable patients to more easily download certain health information from secure websites.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.