At an online session to solicit comments on a proposed framework for a new Federal Health IT Strategic Plan, planners asked for additional advice on tactics for ramping up enforcement of existing privacy and security regulations.
Interview with Prof. Sree Sreenivasan of the Columbia Graduate School of Journalism
Social media aren't just coming - they're here. And senior leaders need to understand how to maximize Facebook, LinkedIn, Twitter and other popular sites, as well as how to protect their organizations from very real security...
Federal regulators have added four more breaches to the tally of major healthcare incidents, with 56 cases now reported since September 2009, when new federal reporting requirements kicked in.
A new survey of executives at 250 hospitals found that 19% had experienced at least one security breach in the past 12 months, up from 13 percent in a similar survey conducted in early 2008.
The U.S. Department of Health and Human Services has awarded $60 million in economic stimulus funds under the HITECH Act to four universities for healthcare IT research projects, three of which will address privacy and security issues.
The firm that has won a $26 million public relations contract from the Department of Health and Human Services for a campaign on healthcare information technology, and related privacy and security issues, stirred up controversy with some of its previous government PR efforts.
Insider crimes are among the biggest threats to public and private sector organizations. And yet too many groups continue to struggle to prevent or even detect these crimes.
In an exclusive interview, Dawn Cappelli of Carnegie Mellon University's Software Engineering Institute, discusses:
Insider threat...
Interview with Gartner's Roberta Witty
Organizations have made strides in business continuity/disaster recovery (BC/DR) planning. But BC/DR professionals need to sharpen their business skills to truly protect their organizations.
This is the stance taken by Roberta Witty, research VP at Gartner. In an exclusive...
Properly securing information technology (IT) infrastructure has never been more critical for organizations in the healthcare industry. Healthcare institutions, plan providers and life sciences organizations alike need to safeguard confidential corporate and patient data from internal and external threats, not only as...
Email continues to be a main source of exposure of protected health information (PHI) and other private data in today's enterprise, but most organizations have yet to deploy technology to prevent costly breaches of PHI. Join this discussion to find out what you need to know about the latest security, privacy and data...
Getting senior executives involved early and making sure they understand the organization's security vulnerabilities are two vital steps in any risk management initiative, says Mark Ford of Deloitte.
In an interview, Ford offers advice on how to:
Win the support of senior executives as well as boards of directors...
Interview with H. Peet Rapp of ISACA's Cloud Work Group
Everyone is talking about cloud computing these days - but are they having the right conversations?
H. Peet Rapp is an information security auditor who sits on ISACA's Cloud Computing Work Group, and he's co-author of the white paper Cloud Computing:...
"While the question of how best to balance privacy and security in the 21st century has no simple answer, what is clear is that our federal electronic privacy laws are woefully outdated," Sen. Patrick Leahy says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.