Best practices for protecting medical devices are sorely lacking. That's why it's excellent news that a new consortium is attempting to devise some best practices for keeping medical devices secure.
Let's hope the final version of the Federal Health IT Strategic Plan for 2011-2015 contains more details about new privacy and security initiatives than the draft that was recently issued.
There are some encouraging signs that stage two criteria for the HITECH Act's electronic health record incentive program will include substantial privacy and security requirements.
Some physician group practices that already have an electronic health record system are playing a game of "hurry up and wait" when it comes to qualifying for HITECH Act EHR incentive payments and bringing their security plans up to date.
While the HITECH Act is jump-starting the shift from paper to electronic health records with its incentive payments, a presidential panel is envisioning a next generation of EHRs that embed privacy protections using XML.
What's embarrassing about the WikiLeaks episode isn't just the precarious position the publication of diplomatic cables put the U.S. in with its allies but the likelihood that one, low-level analyst accessed sensitive data without authorization and then leaked them.
Figuring out a way to make sure health information exchanges play by the same rules when sharing data nationally is proving to be a very difficult task.
An (ISC)2 survey suggests that a Commission on Cybersecurity for the 44th Presidency paper backs a government-run board to oversee IT security certifications, a point disputed by the report's author. Where does the truth lie?
Key factors making the security landscape riskier are the rapid rise of social networking, the growing reliance on cloud computing and the growing sophistication, criminalization and organization of hackers, a new survey shows.
While Generative Artificial Intelligence offers incredible benefits for automation and efficiency, they also present unique security challenges. This blog looks at the most critical security risks to Large Language Models and how to protect against them.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.