It's not enough to recover data after an incident; also essential is restoring the software needed to read the data, as Federal Emergency Management Agency has learned. The inspector general explains it all.
As David Blumenthal, M.D., prepares to step down as National Coordinator for Health Information Technology, it's a good time to assess the privacy and security issues that his successor must address.
What if, while searching the Internet, you come across a Facebook profile of one of your employees, including inappropriate pictures and personal remarks on the supervisor? What does this mean to you as an employer? And what can you do about it?
Has an alleged Stuxnet attack on Iranian nuclear facilities entered the realm of warfare? It may not be a cyberwar, as defined by many experts, but it sure feels like one.
On Jan. 14, a new workgroup advising federal regulators dug into the difficult task of figuring out whether a presidential council's recommendations for electronic health record interoperability are feasible.
The hospital that is treating Rep. Gabrielle Giffords, D-Ariz., and other victims of the Jan. 8 shooting incident in Tucson, Ariz., deserves accolades not only for its care for the victims, but also for calling attention to an important privacy issue.
While IT employment numbers may be lagging, there is strong hope within information security, which is emerging as the hot sector for career prospects in 2011.
When the HITECH Act was enacted early in 2009, much was made of its provisions calling for tougher enforcement of the HIPAA privacy and security rules. But we're still waiting for ramped-up enforcement to begin.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.