The Social Security Administration sold the information in a database of deceased individuals that erroneous contained the Social Security numbers, dates of birth, full names and ZIP codes of living people, the inspector general reports.
The advanced persistent threat attack against RSA has raised the visibility of multifactor authentication technology to potential users. And, in the long run, that might help RSA's bottom line.
HealthcareInfoSecurity.com will provide in-depth coverage of privacy and security issues at the Healthcare Information and Management Systems Society Conference next week.
It's not enough to recover data after an incident; also essential is restoring the software needed to read the data, as Federal Emergency Management Agency has learned. The inspector general explains it all.
As David Blumenthal, M.D., prepares to step down as National Coordinator for Health Information Technology, it's a good time to assess the privacy and security issues that his successor must address.
While the HITECH Act is jump-starting the shift from paper to electronic health records with its incentive payments, a presidential panel is envisioning a next generation of EHRs that embed privacy protections using XML.
Cybersecurity reform was part of a defense bill that included a provision to repeal a law that bar gays from serving openly in the military. Supporters couldn't muster the support to bring a Senate vote on the bill.
No one knows risk better than the internal auditor, and so no individual has a better opportunity to add risk management value to organizations, says Richard Chambers, president of the Institute of Internal Auditors.
To help agencies secure their wireless networks and technologies, the Government Accountability Office came up with eight leading practices. For now, GAO says, wireless networks remain at an increased vulnerability to attack.
An (ISC)2 survey suggests that a Commission on Cybersecurity for the 44th Presidency paper backs a government-run board to oversee IT security certifications, a point disputed by the report's author. Where does the truth lie?
Key factors making the security landscape riskier are the rapid rise of social networking, the growing reliance on cloud computing and the growing sophistication, criminalization and organization of hackers, a new survey shows.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.