Fresh off 11 months as a part-time adviser to federal regulators, John Glaser, CIO of Partners Healthcare in Boston, is making data encryption a top-priority task and urging others to do the same.
All healthcare organizations should create a detailed plan for meeting the requirements of the HITECH breach notification rule, says attorney Gerry Hinkley.
Shifting from desktop PCs to thin clients can provide a more secure way for clinicians to access electronic health records, says Dee Cantrell, R.N., chief information officer at Emory Healthcare in Atlanta.
For physician group practices, security should not be an afterthought to operational issues when implementing electronic health records, says security expert Jack Daniel of Concordant.
Just how common are information breaches at hospitals? That depends on which survey you believe.
For example, a survey of 220 hospitals released April 20 found that 84 percent of U.S. hospitals have at least one breach incident a year, and 42 percent have at least 10 incidents. Earlier this month, another survey...
Combining and correlating data to meet specific regulatory compliance requirements can prove cumbersome for financial institutions. Combining that data along with real-time threat detection and analysis, and working it into an incident response plan, can prove nearly impossible.
Register for this webinar for...
About 42 percent of hospitals have at least 10 information breaches a year, according to a new survey. That's double the percentage in a similar survey conducted a year earlier.
A New York managed care plan has learned an important lesson about leased copy machines: Many contain hard drives that should be scrubbed of information before the copiers are returned.
Just when you think you've heard about all the potential ways healthcare information can be breached comes word of an insurance company that forgot to empty a filing cabinet it donated along with other surplus office furniture.
Healthcare organizations must revamp their business associate contracts to help ensure compliance with the HITECH Act's breach notification rule, says security expert Tom Walsh.
In an interview, Walsh points out that under the rule, business associates, such as banks, billing firms and software companies, that have...
To teach new cybersecurity programs, schools are looking to hire skilled information security practitioners as adjunct faculty who can contribute their industry expertise.
For personal health records advocates, pending PHR privacy and security rules can't come fast enough. A new consumer survey found that "worry about the privacy of my information," was the biggest barrier to PHR use.
Interview with Robert Richardson, Director of CSI
How vulnerable are organizations to cyber attack? It depends on your definition of "vulnerable," says Robert Richardson, Director of the Computer Security Institute (CSI). "There's vulnerable," he says, "and then there's likely to be attacked."
In an interview...
Social media aren't just coming - they're here. And senior leaders need to understand how to maximize Facebook, LinkedIn, Twitter and other popular sites, as well as how to protect their organizations from very real security risks.
In an exclusive interview, Prof. Sree Sreenivasan, Dean of Student Affairs at the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.