Recent hacks have uncovered security vulnerabilities that should have been addressed years ago. "These attacks are going to escalate," says Josh Corman of The 451 Group. But organizations can implement basic steps to make the hackers' job harder.
If you need one more reason to take additional steps to prevent health information breaches, here's something to consider. An attorney argues that if breaches, and their high costs, are not brought under control, "I think where we are headed is to an insurance crisis."
Despite improvement in organizations' abilities to plan for and predict disasters, they still lack an effective response. In fact, the biggest gap in business continuity today is understanding, says Lyndon Bird, director at the Business Continuity Institute.
Security expert Kate Borten contends the proposed accounting of disclosures rule's requirement to provide patients with a report listing those who have accessed their records is a good idea.
The fate of pending regulations, an upcoming HIPAA Security Rule compliance toolkit and a crackdown on records snoops were among the most popular news items on HealthcareInfoSecurity in May.
Many have been asking lately if the Department of Health and Human Services' Office for Civil Rights has been effective in carrying out its HIPAA enforcement role. The question is a fair one.
Best practices for protecting medical devices are sorely lacking. That's why it's excellent news that a new consortium is attempting to devise some best practices for keeping medical devices secure.
One of the unexpected impacts of the global economic crisis is that many organizations have lost their business resiliency, says Lyndon Bird, director of The Business Continuity Institute, headquartered in the U.K.
A key factor in ensuring that information technology is available in the wake of a disaster is cross-training IT staff to handle multiple roles, says Terrell Herzig, information security officer at UAB Medicine.
Widely publicized reports aren't giving the full picture of an (ISC)2 survey that projects the doubling of the federal government IT security workforce by 2015.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.