Interview with Allan Bachman of the Association of Certified Fraud Examiners
The magnitude of fraud schemes has grown - the scale and the losses. But the basics of fraud investigation remain sound. And if there's one thing people should know up front, says Allan Bachman of the Association of Certified Fraud...
All healthcare organizations should create a detailed plan for meeting the requirements of the HITECH breach notification rule, says attorney Gerry Hinkley.
For physician group practices, security should not be an afterthought to operational issues when implementing electronic health records, says security expert Jack Daniel of Concordant.
A review of this week's top news items, including:
Breach Alert: Copiers Are a Risk
HITECH Act Compliance for Business Associates
Privacy Concerns a Roadblock to PHRs
After listening to this overview, be sure to check out all of the week's news and views at HealthcareInfoSecurity.com...
Healthcare organizations must revamp their business associate contracts to help ensure compliance with the HITECH Act's breach notification rule, says security expert Tom Walsh.
In an interview, Walsh points out that under the rule, business associates, such as banks, billing firms and software companies, that have...
Interview with Robert Richardson, Director of CSI
How vulnerable are organizations to cyber attack? It depends on your definition of "vulnerable," says Robert Richardson, Director of the Computer Security Institute (CSI). "There's vulnerable," he says, "and then there's likely to be attacked."
In an interview...
Interview with Prof. Sree Sreenivasan of the Columbia Graduate School of Journalism
Social media aren't just coming - they're here. And senior leaders need to understand how to maximize Facebook, LinkedIn, Twitter and other popular sites, as well as how to protect their organizations from very real security...
Shifting from desktop PCs to thin clients can provide a more secure way for clinicians to access electronic health records, says Dee Cantrell, R.N., chief information officer at Emory Healthcare in Atlanta.
In an interview, the CIO of the integrated delivery system, which is affiliated with Emory University and...
Interview with Gartner's Roberta Witty
Organizations have made strides in business continuity/disaster recovery (BC/DR) planning. But BC/DR professionals need to sharpen their business skills to truly protect their organizations.
This is the stance taken by Roberta Witty, research VP at Gartner. In an exclusive...
Interview with H. Peet Rapp of ISACA's Cloud Work Group
Everyone is talking about cloud computing these days - but are they having the right conversations?
H. Peet Rapp is an information security auditor who sits on ISACA's Cloud Computing Work Group, and he's co-author of the white paper Cloud Computing:...
Getting senior executives involved early and making sure they understand the organization's security vulnerabilities are two vital steps in any risk management initiative, says Mark Ford of Deloitte.
In an interview, Ford offers advice on how to:
Win the support of senior executives as well as boards of directors...
Interview with Tom Smedinghoff of Wildman Harrold
The topic has been discussed for years, but now truly is the time for organizations to invest in federated identity management.
So says Tom Smedinghoff, partner at Chicago-based law firm Wildman Harrold. In an exclusive interview, Smedinghoff discusses:
What's...
Interview with Adrian Davis of the Information Security Forum
In terms of payments, privacy and third-party relationships, U.S. security leaders have much to learn from - and share with - their peers in the U.K. and elsewhere in the world.
This is the perspective of Adrian Davis, a senior research consultant...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.