We're pleased that two members of Congress have asked the Government Accountability Office to study whether federal regulators are adequately addressing the security risks involved in using wireless medical devices.
The Food and Drug Administration will host a public workshop Sept. 12-13 to discuss issues related to potentially regulating certain mobile medical applications.
"Veterans should have consistent and convenient access to reliable VA information real time using social media, whether on a smartphone or a computer," Secretary of Veterans Affairs Eric Shinseki says.
"The timing and the targets point to China," says cybersecurity policy expert James Lewis. "Spying right before the Beijing Olympics and focusing on Southeast Asia reflects China's larger interests more than those of any other country."
Bowing to demand from staff, the Department of Veterans Affairs plans to allow the use of Apple's iPads and iPhones for certain purposes beginning Oct. 1.
Social media, mobility and cloud computing are new areas of risk for organizations, and risk managers need to go back to the fundamentals of understanding the information they are protecting, says Robert Stroud, ISACA's international vice president.
The Department of Veterans Affairs soon will enable clinicians to use more mobile devices to view patient information, taking several steps to help ensure security.
Emerging technology is often touted for enhancing security. But if not properly deployed and integrated, these technologies can hinder rather than improve security.
New mobile technology is behind a growing public concern about Internet security, says former Transportation Security Administration CISO Patricia Titus, who now holds the same post at Unisys.
Facebook's facial recognition feature clearly impacts the privacy profession and workplace by creating new challenges and raising significant concerns on the issue of trust.
Be vigilant about online security, DHS says, as part of its Stop, Think, Connect cybersecurity awareness campaign. Users' money and identity are at risk without proper safeguards.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.