Enterprises should test the processes they establish to respond to advanced persistent threat attacks, just as they vet their business continuity plans, ISACA International President Robert Stroud says.
It's hurricane season, but natural and man-made disasters can happen anytime. Unfortunately, healthcare organizations are often unprepared for how to rebound so their data operations continue to run smoothly and securely in the wake of a crisis.
Three Chinese nationals seeking to make "big bucks" broke into the computers of Boeing and other military contractors, stealing secrets on transport aircraft, a U.S. criminal complaint says. Read how they allegedly did it.
The Department of Homeland Security confirms that "a potential intrusion" of the Office of Personnel Management's network occurred in March but says officials have not identified any loss of personally identifiable information.
With the Senate Intelligence Committee overwhelmingly approving the Cybersecurity Information Security Management Act, common wisdom dictates the bill will head directly to the Senate floor. Not so fast.
Several Blue Shield of California spreadsheet reports inadvertently containing the Social Security numbers of 18,000 physicians and others were released 10 times by the state's Department of Managed Health Care. How could this have been prevented?
Is having too many stakeholders who care about cyberspace's viability a hindrance to security? That's one way to interpret comments from White House Cybersecurity Coordinator Michael Daniel as he addresses the challenges of governing the Internet.
St. Vincent Breast Center in Indianapolis has notified 63,000 individuals that a clerical error led to the mailing of letters containing personal health information to the wrong recipients.
External attacks are on the rise, and healthcare organizations need to be prepared to defend against sophisticated cybercriminals who seek critical medical data to commit fraud or turn a profit.
The Alabama Department of Public Health is notifying 1,200 young adults that they could be potential victims of a $20 million tax fraud ring as a result of an information breach at the agency.
Characterizing the state of employment among American information security practitioners, executive recruiter Joyce Brocaglia says, "We are experiencing negative unemployment in the field of information security."
A robust incident response plan is essential to comply with the HIPAA Omnibus rule -- and to minimize the impact of a breach, says Seattle Children's Hospital CISO Cris Ewell.
What is the consumer impact of big data breaches such as Target's and P.F. Chang's? Victims blame the breached entities, and they want government action, says Al Pascual of Javelin Strategy & Research.
While HHS is making strides in its battle against fraud, some of the fraud-busting recommendations from the watchdog agencies are the same suggestions that GAO and OIG have been making for years.
From Neiman Marcus to P.F. Chang's, 2014 has shaped up to be the 'Year of the Data Breach.' What lessons can be gleaned from the trenches of breach investigation? Experian's Michael Bruemmer shares tips.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.