While the overall numbers seem relatively small when the entire universe of cyber incidents is considered, they suggest the IT systems that control the critical infrastructure America's economy and society rely on to function are increasingly at risk.
People receiving IT security graduate degrees are highly educated, but as the Center for Internet Security's William Pelgrin says, "We have a deficit of those individuals who can pick up the ball and run with it very quickly." He's doing something about that.
HIPAA compliance audits will continue next year after the results of this year's pilot program are analyzed, a federal official confirms. And the protocol for the audits could be refined based on the pilot.
Learning how alleged fraudsters hacked systems and traded in stolen credit- and debit-card numbers can help organizations take steps to protect their customers' and stakeholders' sensitive information.
In the wake of the Supreme Court ruling, security and privacy leaders need to forge ahead with initiatives that were left in limbo while the court weighed the constitutionality of the healthcare reform law.
In what is being called "the largest coordinated international law enforcement action in history directed at carding crimes," 24 suspects have been arrested in a fraud scheme likely involving more than 400,000 accounts.
Hacktivist attacks are on the rise. So how should organizations respond? ISF researcher Gregory Nowak offers unique advice about the role communications plays when hacktivist threats emerge.
Occupational fraud is quite possibly the largest form of fraud, says John Warren of the ACFE. So how can organizations spot the potential fraudsters and prevent their crimes? Warren shares insights.
A new GAO report criticizes HHS for its tardiness in issuing guidance for how to de-identify patient data. The report also calls on HHS to spell out plans for continuing its HIPAA compliance audit program beyond this year.
A cancer center recently discovered patient data was embedded in PowerPoint charts accessible via the Internet. What can organizations do to prevent this kind of data exposure?
The Markle Foundation has updated its guidance on health information exchange privacy and security issues to help HIE organizers and participants develop an environment of trust. Learn about the latest recommendations for policies and practices.
When it comes to fighting financial fraud, Peter Tapling of Authentify says banking institutions are chronically underestimating and under-utilizing one key resource: Their own customers.
As Information Security Media Group continues to grow, veteran healthcare IT journalist Marianne Kolbasuk McGee has joined the staff as managing editor of HealthcareInfoSecurity.
Owners of critical infrastructure might be shamed into providing the necessary security to safeguard their information assets. That's one takeaway of a compromise Senate bill proposed by Democrat Sheldon Whitehouse and Republican Jon Kyl.
With the increasing amount of data being collected by organizations, the role of the data scientist has emerged to aid in analysis. What's unique about the role and what job functions does it entail?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.