How can organizations ensure that their information security staff is mitigating the latest threats? And what truly defines an information security professional? Here are some of the key ingredients.
Voluntary national standards, including privacy and security guidelines, for health information exchanges are inching forward. Federal authorities soon will seek comments on plans for a Nationwide Health Information Network Governance Rule.
New advisories from Visa suggest that payments processor Global Payments Inc. may have been breached in June 2011 - nine months earlier than initially reported.
The latest spin on the insider threat: malicious outsiders taking advantage of inadvertent insiders, says Dawn Cappelli of Carnegie Mellon University. Learn how to detect and prevent these attacks.
Susan McAndrew of the HHS Office for Civil Rights provides insights about an omnibus package of regulations - including a revised version of the HIPAA breach notification rule - that's now in the final stages of review.
Payments processor First Data warns about an uptick in trolling - hackers sniffing networks for easy access to merchants' point-of-sale systems. What can banks do to help merchants prevent breaches?
New federal privacy and security guidance for health information exchanges
provides a good framework, but the recommendations will need to be phased in over time, says the director of a statewide HIE initiative in Indiana.
Symantec says Internet vulnerabilities are down, but don't get too comfortable. We can expect more attacks in 2012. Why are the same threats still posing so much concern?
If you handle critical data, you've got to be humble, advises Bob Carr, CEO of breached processor Heartland Payments System. "Anyone that thinks they're not going to be breached is being naïve."
Among the provisions of the Federal Information Security Amendments Act, approved by a voice vote, is a requirement that agencies implement continuous monitoring of their IT systems to identify vulnerabilities before a cyber incident occurs.
When Joseph Bognanno of Wolters Kluwer Financial Services examines 2012's financial fraud trends, all he sees is more - more of everything, from schemes to new guidance. How can banks stay ahead?
Though not perfect, says House Cybersecurity Co-Chair Jim Langevin, D-R.I., "CISPA represents an important good-faith effort to come together as a necessary first step toward better cybersecurity for our nation."
The new HITRUST Cybersecurity Incident Response and Coordination Center is an excellent concept. But will the collaborators be able to achieve their lofty goals of identifying and helping thwart hacker attacks?
Minnesota Attorney General Lori Swanson has issued a six-volume investigative report on Accretive Health Inc., a medical debt collection company that her office sued in January in connection with a data breach incident and other business practices.
What do the proposed Stage 2 rules for the HITECH Act electronic health record incentive program have to say about encryption and other security measures? Consumer advocate Deven McGraw provides an analysis.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.