A proposed unique medical device identifier would help the Food and Drug Administration more easily pinpoint malware issues and other safety and security problems, says FDA executive Jay Crowley.
Ethical hacker Barnaby Jack says healthcare organizations and manufacturers can take steps to minimize medical device security and safety risks. Find out his recommendations.
Developing a bring-your-own-device
policy that's well-integrated with an organization's overall information security strategy requires a multi-disciplinary, collaborative approach, says attorney Stephen Wu.
How do we provide mobile applications to our users that fulfill their need for immediate access, but also provide them with assurance that their information is safe? Here are four fundamentals.
Cloud-based botnets and mobile malware are two of 2013's top cyberthreats. What other threats make the list? Georgia Tech's Paul Royal tells how security pros and organizations can prepare.
Despite numerous data breaches, as well as financial incentives and penalties, many healthcare organizations aren't taking risk assessment requirements seriously. Experts offer insights on best practices.
President Obama's re-election paves the way for continuation of the HITECH Act EHR incentive program and provides a perfect opportunity for the administration to toughen the program's privacy and security requirements.
Mobility continues to change the landscape for security professionals concerned with data loss and the growing number of endpoints, says CTO Dan Hubbard, who offers mitigation strategies.
It's difficult to know where sensitive patient information may be lurking in user files. But some healthcare organizations are finding ways to detect where the information resides so they can protect it. Find out how.
NIST has issued a draft of guidance that defines the fundamental security components and capabilities needed to help mitigate the risks involved in using the latest generation of mobile devices.
Staff education and a mobile device management system are critical to minimizing BYOD risks at healthcare organizations, says security consultant Tom Walsh. Find out his other mobile security tips.
How can hospitals and physicians prepare to comply with the HITECH Act electronic health record incentive program's Stage 2 privacy and security requirements? Federal privacy officer Joy Pritts provides insights.
With the release of the iPhone 5, and other new mobile devices and upgrades on the way, how should security leaders prepare their organizations for 2013? Intel CISO Malcolm Harkins offers guidance.
The FBI has alerted consumers about two Trojans that have compromised mobile devices running the Android operating system. But are all mobile devices at risk?
Windows 8 is coming and includes security upgrades. How should security and technology leaders approach Microsoft's updated operating system? Forrester analyst Chenxi Wang offers recommendations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.