FTC settlement agreements in two cases involving data exposed on peer-to-peer networks offer a reminder of the risks involved in using the networks. Social Security numbers, healthcare information and other personal details were exposed.
Yet another high-profile breach involving a stolen unencrypted laptop is prompting Sen. Al Franken, D-Minn., to consider whether the nation needs an encryption mandate for healthcare information.
Factors driving up the index vary from month to monthly, but the clear takeaway of the survey of IT security practitioners is that they're getting more apprehensive about safeguarding IT.
A new guide from federal regulators on key privacy and security issues to address when adopting electronic health records is valuable. But additional guidance on risk assessments and other issues is needed.
Application security is driving demand for highly skilled consultants. It's a challenging profession, and I've broken out five key skills that will distinguish you in the field.
How can organizations ensure that their information security staff is mitigating the latest threats? And what truly defines an information security professional? Here are some of the key ingredients.
The new HITRUST Cybersecurity Incident Response and Coordination Center is an excellent concept. But will the collaborators be able to achieve their lofty goals of identifying and helping thwart hacker attacks?
News of sanctions against a small physician practice in Phoenix for HIPAA violations illustrates that organizations of all sizes must comply, or suffer the consequences.
CIO Roger Baker concurs with auditor's recommendations, saying the Department of Veterans Affairs has "embarked on a cultural transformation" and that "securing information is everyone's responsibility."
Rules for Stage 2 of the HITECH Act electronic health record incentive program are a work in progress, so there's still time to comment on the privacy and security provisions.
Jet Propulsion Laboratory IT Chief Technology Officer Tom Soderstrom is showing that a deliberate, methodical approach can lead to effective and secure cloud computing.
An Oregon nursing assistant spent eight days in jail for invasion of personal privacy on Facebook. The case provides an eye-opening lesson about the consequences of misusing social media.
Cybersecurity Act sponsors intensify their campaign to enact the legislation that would change the way the government protects critical federal and private-sector IT networks as a group of key Republican senators offers an alternative bill.
The rapid adoption of electronic health records at physicians' offices, which are making the transition from paper to digitized records in the blink of any eye, means ensuring the security of that information is a major challenge.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.