Symantec says Internet vulnerabilities are down, but don't get too comfortable. We can expect more attacks in 2012. Why are the same threats still posing so much concern?
The Department of Veterans Affairs will not expand its use of iPads and iPhones until later this summer when an enterprisewide mobile device management system to monitor the devices and ensure security is implemented, says CIO Roger Baker.
Rep. Dan Lungren introduced an amendment to his onetime bipartisan cybersecurity bill that won only the backing of fellow Republicans with Democratic members of the House Homeland Security Committee objecting to the changes.
When creating a patient portal that provides access to electronic health records, healthcare organizations must educate patients about the need for authenticating their identities, says Sharp Healthcare CIO Bill Spooner.
Delaware Chief Security Officer Elayne Starkey offers her insight into the security challenges organizations face with two of IT's most popular trends: mobile device use and cloud computing.
Healthcare organizations need to make mobile device security a top priority because so many recent data breaches can be tied to poor mobile device management, says consultant Jeff Brandt.
Ignorance is not bliss. Two new studies, when viewed together, show that consumers' ignorance of the consequences of their actions coupled with enterprises' unawareness of their computing environment equal unacceptable risk.
When it comes to mobility and bring-your-own-device, which policies should organizations and leaders use to ensure security and ongoing best practices? Joe Rogalski of First Niagara Bank offers tips.
Cloud services are being adopted increasingly by organizations. But with adoption comes increased concern, says Symantec's Francis deSouza. How can organizations deploy cloud security to protect their data?
Cloud computing continues to be a hot topic for organizations, says Entrust's David Rockvam. What issues should be top-of-mind when using the cloud, and how can organizations ensure security?
Mobile device management systems are relatively immature, so shoppers need to ask probing questions about the systems' functionality, advises security consultant J. David Kirby.
As the use of mobile devices explodes and health information exchanges gear up, it's time to consider whether adequate privacy and security measures are in place.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.