Federal regulators stirred up controversy when they sent a letter to five healthcare associations warning that the government will prosecute healthcare providers who "game" the system by using EHRs to submit fraudulent bills.
The information security threat landscape has evolved considerably over the past six years, and it's time that organizations' defenses evolve to match them, says Tom Kellermann of Trend Micro.
The Department of Veterans Affairs on Sept. 30 will award a contract for an enterprise mobile device management system that will support more than 100,000 devices. Find out how BYOD fits into the VA's plans.
Healthcare organizations need to be aware of online attacks plaguing the banking industry that could pop up in other sectors. Learn about the outages at five banks and their implications.
NIST's Ron Ross, one of the world's top information risk thought leaders, says new guidance he co-wrote doesn't dictate how organizations must approach risk assessment, but gives enterprises options on how to conduct risk appraisals.
Harvard-affiliated Dana-Farber Cancer Institute researchers are using new technology to securely e-mail sensitive documents to each other and outside collaborators. Find out how the system works.
HealthcareInfosecurity.com announces its second annual Healthcare Information Security Today Survey gauging top trends, threats and priorities for hospitals, clinics, health plans and integrated delivery systems.
With so much hype and confusion around cybersecurity, falsely claiming an attack can have an impact on organizations trying to safeguard their digital assets.
Accountable Care Organization participants face a number of challenges regarding security and privacy, including obtaining patient consent for sharing their information, says Bill Spooner, CIO at Sharp Healthcare.
The latest updates to the federal tally of major health information breaches confirm that the loss or theft of unencrypted devices continues to plague the industry. Learn all the latest details.
The guidance discusses methods, techniques and best practices for the sanitization of target data on different media types and risk-based approaches organizations can apply to establish and maintain a media sanitization program.
The federal government has unveiled five pilot projects, including two that involve healthcare, that, if successful, could help build trust in online commerce and boost the economy, says Jeremy Grant, head of the National Strategy for Trusted Identities in Cyberspace National Program office.
The CISO of Beth Israel Deaconess Medical Center calls on the Food and Drug Administration to take bold action to help ensure the security of medical devices, which are vulnerable to malware.
The new report aims to help access-control experts improve their evaluation of the highest security access-control systems by discussing the administration, enforcement, performance and support properties of mechanisms that are embedded in each system.
Budgets are a big issue today for those managing their risk management frameworks, says NIST's Ron Ross, who offers his advice on using cloud as a means to save money and improve IT infrastructure.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.