An Oregon nursing assistant spent eight days in jail for invasion of personal privacy on Facebook. The case provides an eye-opening lesson about the consequences of misusing social media.
Organizations are not taking the advanced persistent threat seriously enough, says Hord Tipton of (ISC)2. But security professionals also are not mitigating the common threats, he says. Watch the video.
"The changes we propose in revision 4 are directly linked to the current state of the threat space - the capabilities, intentions and targeting activities of adversaries - and analysis of attack data over time," says NIST's Ron Ross.
A social media policy is essential for healthcare organizations using social networks as new communication channels. But what needs to be considered when drafting such a policy?
The Healthcare Information and Management Systems Society Conference, to be held Feb. 20-24 in Las Vegas, will offer a wealth of educational content on privacy and security issues.
Verisign Inc. may have followed the letter of the law when revealing a series of breaches in an SEC filing. But the company that assures the flow of a hefty portion of Internet traffic should have been more forthright to ease the minds of its various constituencies.
The uproar over Google's latest privacy policy is much ado about nothing, especially the cry from some in Congress that the Internet company won't allow users to opt out of its new policy.
The privacy risks involved in using social media in healthcare can be minimized through innovative staff education, says risk management expert Paul Anderson.
Steven VanRoekel says the mobile revolution will fundamentally change the way the federal government serves the public and its employees. But in outlining the Federal Mobile Strategy, the federal CIO hardly mentions security and privacy.
While organizations need to make investments in data protection and storage, it's crucial that they first get a real handle on classifying their data before allocating resources in the wrong places.
When the Commonwealth of Pennsylvania suffered a major security breach a few years back, vulnerabilities in a Web application were to blame. CISO Erik Avakian explains how the state developed a process to correct flaws in application code.
Dice.com reports a 79 percent increase in the total number of information security jobs posted to its site. What are the five hottest career prospects for aspiring pros?
2011 has offered quite a number of tough lessons for security professionals. Here at (ISC)2, where security education is our focus, the close of another year raises the old teacher's question: "What have we learned, class?"
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.