Despite numerous data breaches, as well as financial incentives and penalties, many healthcare organizations aren't taking risk assessment requirements seriously. Experts offer insights on best practices.
President Obama's re-election paves the way for continuation of the HITECH Act EHR incentive program and provides a perfect opportunity for the administration to toughen the program's privacy and security requirements.
It's difficult to know where sensitive patient information may be lurking in user files. But some healthcare organizations are finding ways to detect where the information resides so they can protect it. Find out how.
How can hospitals and physicians prepare to comply with the HITECH Act electronic health record incentive program's Stage 2 privacy and security requirements? Federal privacy officer Joy Pritts provides insights.
What is the focus of new guidelines from the PCI Security Standards Council on mobile payment acceptance security? The council's Bob Russo and Troy Leach discuss key objectives - and what's coming next.
As mobile computing becomes ever-present, enterprises face a new threat landscape that includes rogue marketplaces, insecure public Wi-Fi and proximity-based hacking, says Dan Hubbard of the Cloud Security Alliance.