IT security pros see metrics as a useful tool to validate operational performance. But many organizations' top leaders evaluate security on cost. It's time to bridge that gap.
There's been a lull in big healthcare data breaches hitting the federal "Wall of Shame" tally so far in 2013. But that will likely change soon. Find out why.
As personalized medicine continues to grow, how should genetic information be protected when it's incorporated into patients' electronic health records? Federal adviser Dixie Baker offers insights.
Izz ad-Din al-Qassam Cyber Fighters says more DDoS attacks against U.S. banks are on the way. This fourth campaign will be "a bit different," the group says. Learn what experts expect.
Providing patients with more transparency into who's electronically requesting their health information can not only improve data privacy, but also help patients catch record errors and ID theft, says David Staggs, a participant in a new pilot.
The National Security Agency is piloting a new program, as a result of the Edward Snowden incident, in which systems administrators with top-secret clearance can access certain secret documents only with the approval of another colleague.
Because state HIEs vary in connectivity and interoperability levels, secure e-mail based on the Direct Project offers a dependable way of sharing patient data during a disaster, says Tia Tinney of the Southeast Region Collaborative for HIT.
A former respiratory therapist has pleaded guilty in an ID theft case involving more than 800 patient records. A security expert explains why detecting insider fraud can be difficult and offers prevention tips.
What can the Food and Drug Administration do to improve the security of medical devices? Sharon Finney, data security leader at Adventist Health System, offers her insights and also describes her organization's security efforts.
Bruce McConnell, acting deputy undersecretary for cybersecurity, says he'll resign from the Department of Homeland Security on Aug. 10, making him the third senior cybersecurity official to leave DHS this year. He's seen as one of DHS's leading cybersecurity theorists.
Draft legislation circulating in the Senate, if enacted, would serve as Congress' endorsement of President Obama's order to create best practices that industry could voluntarily adopt, says Jacob Olcott, the former counsel to the committee that wrote the bill.
As social media use grows, so do the risks of organizations getting caught up in costly legal disputes over ownership and assets. Alan Brill of Kroll advises on how to mitigate such risks.
New state health insurance exchanges will face many security and privacy hurdles. But ensuring that consumer information is secure with data handlers on the front end is a critical first step.
An employee of the New York state agency that investigates Medicaid fraud is being investigated after the individual allegedly sent 17,743 records to the worker's personal e-mail account.
At a time of heightened cybersecurity threats, few organizations have processes for employees at all levels to report breaches. It's time for accelerated breach response, says attorney Ellen Giblin.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.