"The environment that started by supporting whistleblowers ... is essentially morphing into 'Gee, we as an organization need to be completely transparent, whether we want to or not,'" says Cal Slemp, managing director of Protiviti.
Thwarting the insider threat entails more than knowing an individual with access to a computer, but to recognize the synergy between the individual, organization, technology and environment, I3P Research Director Shari Lawrence Pfleeger says.
This week's top news and views: Revised NHIN Governance Plan Advances; Sizing Up the Role of XML in EHRs; Top Healthcare Security Trends for 2011. And don't miss our audio week-in-review podcast by Howard Anderson, managing editor.
Devising strategies for ensuring social media are not used in ways that violate patient privacy is one of the top trends for 2011, says Lisa Gallagher, senior director of privacy and security at the Healthcare Information and Management Systems Society.
With a hodgepodge of networks, applications and operating systems to manage - maintaining security and preventing breaches can be difficult. The challenges are daunting, but solutions are at hand.
This is the perspective of Roark Pollock of HP Tippingpoint. In an interview, Pollock discusses three specific...
Expanding use of secure messaging as well as remote access to information systems are key 2011 IT priorities for Shriners Hospitals for Children, says Bill Bria, M.D., chief medical information officer.