The Annual HIMSS Leadership Survey is far from scientific. But the results are nevertheless eye-opening. This year's results show that 23% of responding organizations have had some sort of a security breach in the past year. And that's a big number.
Sitting in an all-day security workshop at the HIMSS Conference in Atlanta Feb. 28 provided me with a good education about what's on the minds of security leaders. For example, one member of the audience said it was a "huge challenge" to ensure that when an employee is fired, their password is promptly deactivated so...
Michael Frederick, chief information security officer at Baylor Healthcare System in Dallas, is using the HITRUST Common Security Framework to help ease the task of complying with multiple regulations.
In an interview, Frederick, who heads a staff of 22, describes how the framework is helping him achieve several...
Every year, the Healthcare Information and Management Systems Society's conference offers a crash course on all aspects of applying information technology in healthcare. This year's show, to be held Feb. 28-March 4 in Atlanta, will offer more content than ever on privacy, security, compliance and risk management...
If you need one more reason to comply with the breach notification provisions of the HITECH Act, here it is: Enforcement begins February 22. After years of lax enforcement of the Health Insurance Portability and Accountability Act's privacy and security rules, HITECH spells out several tough enforcement measures,...
It's hard to place a value on an intrusion detection system until you see the system in action. CIO Charles Christian at Good Samaritan Hospital in Vincennes, Ind., recently discovered just how worthwhile his intrusion detection investment really is.
I'm excited about today's launch of the 2010 Banking Information Security Today Survey, and you should be, too.
Think about it: Identity theft, fraud, regulatory compliance, vendor management, security awareness, risk management, privacy. These topics have no industry loyalty; they're common to all public and...
Every IT vulnerability survey of the past 10 years has had the same item at the top of the list: internal personnel our so-called trusted workers. Billions of dollars, countless vulnerability assessments, thousands of innovative security solutions later, and we still haven't moved the trusted worker off the top of the...
Patients have a right to know when their information was disclosed or breached. And so does the Department of Health and Human Services (HHS), and in some extreme cases, your local news media - largely because of the HITECH Act.
A new report outlining a four-year national strategy for dealing with pandemics and other disasters singles out the important role information technology, especially electronic health records, can play.
The report from the U.S. Department of Health and Human Services, "National Health Security Strategy of the...
I'm sorry, but weren't we just celebrating the holidays?
Unbelievable how fast the New Year has flown by already. It seems like we're all trying to get 12 months worth of work done in one.
We've experienced two waves of the H1N1 pandemic. What lessons have we learned?
Sue Kerr, President of Continuity First, a business continuity/disaster recovery consultancy, talks about how organizations have handled H1N1. She also discusses:
the state of BC/DR;
Challenges facing organizations today;
2010...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.