In this week's breach roundup, read about the latest incidents, including the fourth major breach affecting Stanford University medical facilities and a vendor misplacing information on 6,000 Utah Medicaid clients.
The sentencing of a former hospital emergency department worker in a data theft case serves as a reminder of why healthcare organizations need to take steps to prevent improper access to records.
As a growing number of enterprises turn to cloud computing, the government could reclassify the cloud as a critical infrastructure, putting it on par with electrical grids, public-health networks and banking systems. Will regulations follow?
New guidance on when to notify authorities of a breach is one of the most significant provisions in the HIPAA omnibus final rule, experts say. Find out what other provisions are drawing attention.
ENISA, the European Union cyber-agency, is out with its first-ever Threat Landscape report. What are the emerging threats and vulnerabilities, and how should organizations globally respond to them?
In the rush to allow personal devices to be used for work, we in application security neglected to examine thoroughly the new risks external applications may introduce to our organizations.
In this week's breach roundup, British Columbia's health minister has confirmed personal health data for millions of individuals was accessed for research purposes without authorization, and a Canadian agency lost a device containing student loan information for almost 600,000.
Convenience is nice, but don't equate making work easier with productivity - especially to the tune of $28 billion a year for the U.S. federal government, which a just-released survey contends.
Following a breach, one healthcare organization banned the use of cell phones by volunteers. Was this a proactive measure or an overreaction? Kate Borten and other security experts offer analysis.
It isn't so much the changing threat landscape that causes security leaders to re-assess their approach to incident response. Mobility and the expanding perimeter are the real factors driving change.
An incremental approach to HIE guidance is reasonable to help avoid stunting the use of emerging technologies. But the issuance of guidelines shouldn't be dragged out - which I fear is a possibility.
Three recent identity theft incidents highlight the need for healthcare organizations to stay vigilant in preventing fraud involving insiders. Security experts offer advice.
If we're at war, the fight so far is unbalanced, and the U.S. should be grateful its cyberspace adversary is Iran. "We're probably not very prepared for a virtual conflict against a really competent state, such as Russia or China," says Rand Corp.'s Martin Libicki.
Kathryn Marchesini, a privacy adviser at the Office of the National Coordinator for Health IT, outlines the three most important steps healthcare organizations should take to avoid breaches of information on mobile devices.
In this week's breach roundup, regulators are investigating a possible breach involving Kaiser Permanente and a business associate, and hackers compromise servers at a University of North Carolina cancer center.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.