Although there's plenty of talk about cybersecurity threats involving devious international hackers, the real threat to the security of healthcare information, I believe, is staff members who aren't paying enough attention to the little details. The Gartner Group's John Pescatore said it well in a recent interview:...
C. Warren Axelrod is a veteran banking/security executive and thought-leader, and in an exclusive interview at the RSA Conference 2010 he discusses top security trends and threats, including:
Insider fraud;
Application security;
Cloud computing.
Axelrod is currently executive advisor for the Financial...
The Annual HIMSS Leadership Survey is far from scientific. But the results are nevertheless eye-opening. This year's results show that 23% of responding organizations have had some sort of a security breach in the past year. And that's a big number.
Sitting in an all-day security workshop at the HIMSS Conference in Atlanta Feb. 28 provided me with a good education about what's on the minds of security leaders. For example, one member of the audience said it was a "huge challenge" to ensure that when an employee is fired, their password is promptly deactivated so...
Application security is rapidly becoming the next hot focus area for information security professionals.
Momentum began to build in 2008, when Information Security Media Group's (ISMG) Application Security Survey showed that 90% of respondents saw application security as somewhat or a significant part of their...
TennCare, Tennessee's Medicaid program, recently sent letters with personal information on about 3,900 enrollees to the wrong addresses, state officials confirmed.
Let's give BlueCross and BlueShield of Tennessee some credit for acknowledging that it has spent more than $7 million so far dealing with the aftermath of the theft of 57 unencrypted hard drives from a call center.
That breathtaking sum makes it crystal clear that potential data breaches have huge business...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.