Increasingly, digital forensics is an important element of an information security program for organizations of all types and sizes.
But where can security leaders find qualified forensics professionals? How can these professionals obtain the skills and expertise they need to be successful?
Rob Lee of Mandiant...
(Part three)
The most significant security provision of the HITECH Act is its explicit requirement for healthcare organizations to promptly notify individuals of data security breaches.
A former patient care assistant at a Houston hospital was sentenced to 60 months in prison on February 3 after pleading guilty to bank fraud and stealing the identities of patients.
Provisions of the bill would help develop a skilled government infosec workforce, prioritize federal cybersecurity R&D, improve the transfer of cybersecurity technologies to business and promote cybersecurity education and awareness.
Two federal advisory committees will meet later in February to consider whether to recommend modifying two proposed electronic health record rules that affect healthcare information security.
Interview with James Van Dyke of Javelin Strategy & Research
Identity fraud crimes expanded at a 12% rate in 2009. What can we expect to see in 2010?
Javelin Strategy & Research is out with its latest Identity Fraud Study. For insight on the study results and what they mean to organizations across industry,...
Dena Haritos Tsamitis has an ambitious goal for the year: to improve cyber awareness among 10 million people globally.
The Director of Education, Training and Outreach at Carnegie Mellon University's CyLab, Dena discusses:
The cyber awareness challenge among people of all ages;
Effective techniques for...
I'm excited about today's launch of the 2010 Banking Information Security Today Survey, and you should be, too.
Think about it: Identity theft, fraud, regulatory compliance, vendor management, security awareness, risk management, privacy. These topics have no industry loyalty; they're common to all public and...
When it comes to reporting data security breaches, healthcare organizations have the equivalent of a "get out of jail free" card, says consultant Tom Walsh.
(Part two of a four-part series)
The HITECH Act provides strong new incentives for healthcare organizations to create comprehensive data security plans and train their staffs on how to keep personal health information secure.
The Health Information Trust Alliance has enhanced its HITRUST Common Security Framework for protecting health information to reflect the impact of the HITECH Act.
Demand for qualified information security professionals is beginning to grow in healthcare.
The HITECH Act, which established tougher penalties and broader enforcement of enhanced versions of the HIPAA privacy and security rules, is proving to be a powerful catalyst for ramping up information security. Plus, as...
Every IT vulnerability survey of the past 10 years has had the same item at the top of the list: internal personnel our so-called trusted workers. Billions of dollars, countless vulnerability assessments, thousands of innovative security solutions later, and we still haven't moved the trusted worker off the top of the...
A well-known healthcare information security expert who's advising federal regulators on policy issues offers advice to organizations preparing to comply with the data breach notification requirements of the HITECH Act.
In an interview, Dixie Baker of SAIC advises hospitals and others to:
Study how the HITECH...
The Obama Administration on Feb. 1 released a summary of its fiscal 2011 budget proposal that includes a 28% increase in funding for a unit that plays a major role in ensuring the privacy and security of health information.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.