Gartner's Peter Firstbrook, to illustrate the vulnerability of IT systems, cites research that pegs at about 400 days the average time a targeted virus remains undetected on a computer. And, he says, that doesn't speak highly of the current offerings from security vendors.
Memorial Sloan-Kettering Cancer Center in New York is notifying 880 patients that some of their personal information may have been exposed when it was inadvertently embedded in PowerPoint charts posted on two websites.
Federal action to set aside broadband spectrum for wireless patient monitoring systems has the potential to improve treatment without increasing risks, says medical device expert Dale Nordenberg, M.D.
Big data isn't about size, says Gartner's Neil MacDonald. It's much bigger: Big data is about volume, velocity, variety and complexity, and requires new approaches on how information is used to secure digital assets.
If you'd like to avoid being subjected to a federally mandated biennial data security audit for the next 20 years, you might want to make sure no one in your organization is using peer-to-peer networks.
In many ways, conducting a risk assessment for mobile devices is similar to other IT risk assessments. But there are notable differences, says consultant Jeff Brandt.
A federal audit has verified that the Department of Veterans Affairs is complying with federal encryption requirements in its initial use of iPhones and iPads even though the devices lack the required type of hardware encryption.
Many organizations aren't devoting enough resources to ensure that applications for mobile devices are secure, says security expert Jeff Williams. He offers five tips for adequately addressing mobile application security.
Israel is being blamed - or, perhaps, taking credit - for the creation of Flame, the sophisticated cyberspyware that has targeted organizations in the Middle East, especially its mortal enemy, the government of Iran.
The Obama Administration has unveiled a "digital government" strategy that requires federal agencies to launch new mobile applications. The strategy calls for standardized implementation of privacy controls.
The Department of Homeland Security has issued a report on the risks involved in using wireless medical devices and other mobile technologies in healthcare and the best practices for mitigating threats.
From mobile and the cloud to DDoS attacks and risks surrounding big data, what should banks and credit unions do now to mitigate exposure? Gartner's Anton Chuvakin offers his top recommendations.
A U.S. appellate court decision in a case involving a jail term for a HIPAA violator offers an important reminder of the potential consequences for accessing patient records without a valid reason.
Payments processor First Data warns about an uptick in trolling - hackers sniffing networks for easy access to merchants' point-of-sale systems. What can banks do to help merchants prevent breaches?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.