The ongoing epidemic of health data breaches involving unencrypted laptops demonstrates why many healthcare organizations need to conduct more meaningful risk assessments, says security expert Dan Berger.
Data loss prevention is more important now than ever before. Targeted attacks increased by 42 percent in 2012, with an average of 8,350 identities lost per breach. Watch this 5-minute video from Symantec to understand how a DLP solution may impact your organization.
A review of the RSA 2014 agenda shows several seminars, panels and speakers of particular interest to healthcare-focused attendees, including those focused on mobile device security and medical device hacks.
Kaiser Foundation Health Plan has reached a settlement with the California attorney general over its response to an unusual breach of employees' personal information that occurred in 2011.
HealthcareInfoSecurity has extended the deadline for participation in its annual survey to examine the priorities and challenges of healthcare info security leaders. Preliminary results reveal some pain-points.
From access controls to intrusion detection, mobility to privacy, healthcare organizations face unique network security challenges. Isabelle Dumont of Palo Alto Networks offers a new, unique approach.
Georgia Tech researchers are working on a way to profile devices along the supply chain to identify whether they've been compromised, says Paul Royal, associate director of the Georgia Tech Information Security Center.
The healthcare industry must delicately balance the need to keep medical devices secure with the need to protect patient safety, says Michael McNeil, global security and privacy leader at Medtronic, a device manufacturer.
Healthcare entities are increasingly turning to the cloud, and regulators are increasingly focused on cloud service providers' security. Time to ensure those business associate agreements are in order, says Symantec's Rick Bryant.
Healthcare entities are increasingly turning to the cloud, and regulators are increasingly focused on cloud service providers' security. Time to ensure those business associate agreements are in order, says Symantec's Rick Bryant.
Buried deep within a 308-page report from a presidential panel on ways to tighten federal surveillance and IT security programs are important recommendations on how to mitigate the insider threat at federal agencies.
Many business leaders lack a clear understanding of the value of identity and access management. CISO Christopher Paidhrin offers a scenario for how to make the case for an IAM investment.
Cyberthreats increasingly target mobile devices, and simple security measures could help end-users slash these incidents by 50 percent. This is the key finding of ENISA's new Threat Landscape Report, says Louis Marinos, the prime author.
Compliance with the HIPAA Omnibus Rule, especially when dealing with business associates, is the No. 1 challenge for healthcare CISOs in 2014, says security expert Nadia Fahim-Koster. But what are the other top challenges?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.