It's well known that lost or stolen unencrypted computing devices account for the majority of large health data breaches. But a new report from the Department of Health and Human Services shines a light on how frequently breaches - especially smaller ones - involve paper records.
Consumer rights advocates have applauded Apple's preview of iOS 8 privacy changes, including randomizing MAC addresses to help block retail analytics and unauthorized forms of device tracking.
When NIST issued "Guidelines on Cell Phone Forensics" in May 2007, Apple's introduction of the iPhone was a month away. Seven years later, NIST is revising its guidance and giving it a new moniker, "Guidelines on Mobile Device Forensics."
It's not quite the cyberwar many have envisioned, but the United States and China are tangled in a brawl that resembles, in some respects, a combination of a trade war and cyber-sniping.
To efficiently address mobile security, organizations need to understand and acknowledge how the challenges evolve and become more complex, says Jeff Cobb, CISO at Capella HealthCare.
In the struggle to comply with changing regulatory requirements amidst an evolving technological environment, addressing information security can be overwhelming for many healthcare providers. An expert offers tips for sustainable risk management.
"Security as a business enabler" was the mantra echoing through the recently concluded 2014 Infosecurity Europe conference in London, a message that should have been heeded by top executives at retailer Target last year.
Trusted Identity is the end-goal, and mobile devices are the means to get there, says Dave Rockvam of Entrust. How are mobile devices being leveraged for security in the enterprise today?
One of the biggest misunderstandings about the Heartbleed bug in the healthcare sector is that it only affects websites and Web servers. In fact, medical devices are also at risk for the vulnerability, says security expert Mike Ahmadi.
The recent Verizon Data Breach Investigation Report notes more than 16,000 incidents in the past year where sensitive information was unintentionally exposed. "Nearly every incident involves some element of human error," the report notes.
There's a ton of event content to choose from at Infosecurity Europe 2014, which runs from April 29 through May 1, and here are some of the sessions that caught one editor's eye.
An in-depth report on the 2014 Healthcare Information Security Today survey provides an opportunity for healthcare organizations to benchmark their security and compliance efforts with their peers.
The Government Accountability Office's Gregory Wilshusen is an empathetic IT security auditor, saying he understands why agencies don't always follow his recommendations. Read why.
Federal regulators have released a proposed framework for addressing safety risks involved in using healthcare IT, including EHRs and medical devices. The report takes into account that cybersecurity can play a role in ensuring safety.
Starting now, healthcare organizations using Microsoft Windows XP-based medical devices better have short- and long-term strategies to address cybersecurity, says medical device security researcher Kevin Fu.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.