Beyond mobile device and data security, what are the ID and access challenges facing security leaders - and how are cutting-edge organizations tackling them? CSOs Elayne Starkey and Malcolm Harkins share tips.
Business line managers are in better positions to control and monitor network and system access privileges than IT departments, since they know their employees and the privileges they should be provided, says Bill Evans of Dell Software.
To improve security and increase workforce productivity across an enterprise, a set of integrated capabilities is needed, says Corey Williams, senior director of product management at Centrify.
Because data stored in a cloud-based "sandbox" environment for testing purposes is vulnerable, it should be masked to protect sensitive information, says Karen Hsu of Informatica.
Most organizations are challenged by having too much information in too many places. But Dieter Schuller of Radiant Logic says centralizing data can improve identity management.
Because managing identities is a global problem, it requires a global solution, says Paul Simmonds of the Jericho Forum. A new organization has been established to address global identity. Simmonds offers insight.
National Institute of Standards and Technology's Jeremy Grant says the government will fund pilot projects to accelerate progress toward the creation of improved, interoperable systems for secure, privacy-enhancing trusted online credentials.
The departments of Veterans Affairs and Defense are dropping plans to build an integrated electronic health record system from scratch. Find out why the new approach focuses on interoperability and secure data exchange.
The sentencing of a former hospital emergency department worker in a data theft case serves as a reminder of why healthcare organizations need to take steps to prevent improper access to records.
Banking institutions have spent the last two years enhancing authentication to conform to regulatory mandates. Organizations in other sectors can learn important authentication lessons from the banking industry.
Kathryn Marchesini, a privacy adviser at the Office of the National Coordinator for Health IT, outlines the three most important steps healthcare organizations should take to avoid breaches of information on mobile devices.
A federal advisory panel has recommended that the Office of the National Coordinator for Health IT issue guidance soon on how to verify the identities of patients seeking online access to their records.
The evolution of threats and rise of mobility are leading organizations to improve user authentication. What are the new strategies and solutions security leaders in all sectors will employ this year?
A federal advisory panel will urge the Office of the National Coordinator for Health IT to provide physicians and hospitals with best practices for verifying the IDs of patients using web portals to access records.
"Accessing medical records [should be] as easy as accessing banking records today," says Farzad Mostashari, M.D., national coordinator for health IT, addressing a hearing on patient ID authentication.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.