The new HITRUST Cybersecurity Incident Response and Coordination Center is an excellent concept. But will the collaborators be able to achieve their lofty goals of identifying and helping thwart hacker attacks?
News of sanctions against a small physician practice in Phoenix for HIPAA violations illustrates that organizations of all sizes must comply, or suffer the consequences.
CIO Roger Baker concurs with auditor's recommendations, saying the Department of Veterans Affairs has "embarked on a cultural transformation" and that "securing information is everyone's responsibility."
Rules for Stage 2 of the HITECH Act electronic health record incentive program are a work in progress, so there's still time to comment on the privacy and security provisions.
Jet Propulsion Laboratory IT Chief Technology Officer Tom Soderstrom is showing that a deliberate, methodical approach can lead to effective and secure cloud computing.
An Oregon nursing assistant spent eight days in jail for invasion of personal privacy on Facebook. The case provides an eye-opening lesson about the consequences of misusing social media.
Cybersecurity Act sponsors intensify their campaign to enact the legislation that would change the way the government protects critical federal and private-sector IT networks as a group of key Republican senators offers an alternative bill.
The rapid adoption of electronic health records at physicians' offices, which are making the transition from paper to digitized records in the blink of any eye, means ensuring the security of that information is a major challenge.
What skills are needed to be an effective fraud examiner? My short answer is that, as with any discipline, there are certain skills and areas of knowledge one needs to learn to be successful.
Not all hackers are the same, and that presents problems in defending against them. Understanding each type of hacker can help organizations better prepare for digital assaults.
Clever motivational techniques can play an important role in making sure patient privacy is protected and in creating a corporate culture that values security.
For years, security experts have advised users to wipe their hard drives before discarding them. About 100 owners of one brand of tablets may have wished they did.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.