Developing a bring-your-own-device
policy that's well-integrated with an organization's overall information security strategy requires a multi-disciplinary, collaborative approach, says attorney Stephen Wu.
How do we provide mobile applications to our users that fulfill their need for immediate access, but also provide them with assurance that their information is safe? Here are four fundamentals.
Cloud-based botnets and mobile malware are two of 2013's top cyberthreats. What other threats make the list? Georgia Tech's Paul Royal tells how security pros and organizations can prepare.
Despite numerous data breaches, as well as financial incentives and penalties, many healthcare organizations aren't taking risk assessment requirements seriously. Experts offer insights on best practices.
President Obama's re-election paves the way for continuation of the HITECH Act EHR incentive program and provides a perfect opportunity for the administration to toughen the program's privacy and security requirements.
Mobility continues to change the landscape for security professionals concerned with data loss and the growing number of endpoints, says CTO Dan Hubbard, who offers mitigation strategies.
It's difficult to know where sensitive patient information may be lurking in user files. But some healthcare organizations are finding ways to detect where the information resides so they can protect it. Find out how.
NIST has issued a draft of guidance that defines the fundamental security components and capabilities needed to help mitigate the risks involved in using the latest generation of mobile devices.
Staff education and a mobile device management system are critical to minimizing BYOD risks at healthcare organizations, says security consultant Tom Walsh. Find out his other mobile security tips.
How can hospitals and physicians prepare to comply with the HITECH Act electronic health record incentive program's Stage 2 privacy and security requirements? Federal privacy officer Joy Pritts provides insights.
With the release of the iPhone 5, and other new mobile devices and upgrades on the way, how should security leaders prepare their organizations for 2013? Intel CISO Malcolm Harkins offers guidance.
The FBI has alerted consumers about two Trojans that have compromised mobile devices running the Android operating system. But are all mobile devices at risk?
After being criticized for how it handles incidents involving medical devices affected by information security issues, the Food and Drug Administration is planning to take action.
What is the focus of new guidelines from the PCI Security Standards Council on mobile payment acceptance security? The council's Bob Russo and Troy Leach discuss key objectives - and what's coming next.
The Department of Veterans Affairs will test-drive up to 5,000 tablets and smart phones in pilots during the next six to 12 months before ramping up its use of the devices. Learn about the strategy.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.