The Department of Veterans Affairs soon will enable clinicians to use more mobile devices to view patient information, taking several steps to help ensure security.
Emerging technology is often touted for enhancing security. But if not properly deployed and integrated, these technologies can hinder rather than improve security.
New mobile technology is behind a growing public concern about Internet security, says former Transportation Security Administration CISO Patricia Titus, who now holds the same post at Unisys.
The controversial Accounting of Disclosures Rule is the subject of intense debate. Don't miss your opportunity to make your opinions known to federal authorities.
Security teams need to look at the controls they have put in place in their organization and question whether they are shifting risky behavior to different areas and perpetuating problems, says Intel CISO Malcolm Harkins.
A total of 11 million Americans have been affected by major health information breaches since September 2009. So far in 2011, 2.7 million have been affected by 32 incidents.
Facebook's facial recognition feature clearly impacts the privacy profession and workplace by creating new challenges and raising significant concerns on the issue of trust.
Be vigilant about online security, DHS says, as part of its Stop, Think, Connect cybersecurity awareness campaign. Users' money and identity are at risk without proper safeguards.
Not all shootings, fires and accidents are of equal import, regardless of the dramatic visuals they may produce. The same can be said about information security breaches.
Organizations are starting to adapt to cloud computing, but they're hesitant about placing their core assets in the online environment, according to results from the 2011 ISACA IT Risk/Reward Barometer.
Security consultant Rebecca Herold says that although the proposed Accounting of Disclosures rule poses challenges, it would provide patients with useful information about who accesses their records.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.