Two recent major breach incidents call attention to the value of encrypting backup tapes. A new survey shows how many organizations are taking this precaution.
Winn Schwartau says the BlackBerry disruption this past week (see BlackBerry Disruptions: Where to Start?) hit at the heart of one of the fundamentals of IT security: availability.
The disruption of text messaging and Web browsing for BlackBerry customers opens up issues of company transparency and business continuity. How should the company have responded?
As employers increasingly realize the importance of information risk management, security, audit and governance, they look to certifications to identify prospective employees.
Benjamin Franklin. Thomas Edison. Henry Ford. If there were a Mount Rushmore of great inventors, it wouldn't be out of line to imagine Steve Jobs' face carved into the stone.
"With a company-issued device, you can issue a policy that says users have no rights of privacy over information on the device," says Javelin's Tom Wills. But with employee-owned devices? A whole new set of issues.
Elayne Starkey recently gave up her BlackBerry for an iPhone, and uses the Apple mobile device for personal and work doings, securely connecting to the computer system of her employer, the state of Delaware.
When it comes to mobile banking, which do you believe is the greater security risk: the latest evolution of malware or continued bad behavior by the end user? Experts' answers may surprise you.
In October, the Department of Veterans Affairs will launch a go-slow approach to enabling physicians and others to use Apple iPhones and iPads for limited purposes.
Discussing Verizon's new report on the state of PCI compliance, PCI expert Jen Mack says payment card security today is "disappointing," and global merchants are at serious risk of new data breaches.
Mobile apps and smartphone security are increasing global concerns. But Dr. Giles Hogben of ENISA says mobile malware mania is a bit overhyped, since mobile is actually more secure than most other platforms currently on the market.
News about recent healthcare information breaches offers an important reminder: Monitoring the privacy and security procedures of your business associates should be a vital component of any breach prevention strategy.
The breach earlier this month of certificate authority DigiNotar could prove to be the worst security event ever to happen on the Internet because it threatens, at its core, a fundamental principle of Internet transactions - economic and social - trust.
Take a look at the contract that the Department of Health and Human Services entered with KPMG to conduct HIPAA compliance audits and you'll get a few insights on what healthcare organizations can expect.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.