The increasing connectivity of medical devices brings with it growing risk to patients. Security expert Jay Radcliffe describes how medical device makers can enhance the security of their devices.
The NSA, in a highly classified program code-named Bullrun, used supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine encryption, according to a news report.
Children who get treated at new mobile telemedicine clinics will benefit from electronic health records and secure data exchange, just like patients treated in other settings, says Jeb Weisman, CIO of the Children's Health Fund.
Iris scanning is becoming old hat for authenticating individuals entering secured facilities or crossing international borders, but it remains several years away for use in providing access to IT systems.
If your organization's leadership has been lukewarm to funding information security efforts, it's time to turn up the heat before you end up in hot water with federal regulators enforcing the HIPAA Omnibus Rule.
Operators of media sites should consider adoption of the cybersecurity framework in the aftermath of the recent domain name systems attacks aimed at The New York Times and Twitter.
Until the interoperability of EHRs can be achieved, the Direct Project can help ensure the secure transfer of patient information during a disaster, says Tia Tinney, who's heading a collaborative effort.
Organizations incorporating social media into their daily operations tend to have gaps in policies, and key aspects are often an afterthought, says attorney David Adler, who pinpoints areas to address.
Can roaming services be used successfully as a backup for mobile networks that fail? It's a new idea being explored by the European Network and Information Security Agency. What are the pros and cons?
The theft of four unencrypted computers from a Chicago area medical practice may affect 4 million patients. But the big question is: Why do breaches involving unencrypted computer devices still occur?
The National Institute of Standards and Technology has issued new guidance for designing cryptographic key management systems that describes topics designers should consider when developing specifications.
The recent theft of four unencrypted computers from the Chicago-area Advocate Medical Group physicians practice may have exposed the personal data of more than 4 million patients.
To build credibility for its HIPAA enforcement efforts, the Department of Health and Human Services needs to ramp up its breach prevention efforts for the health insurance exchanges slated to begin operations Oct. 1.
To address the insider threat, Jeremy Walczak of Independent Health is using a privileged identity management system. Walczak and other experts offer detailed insights on mitigating emerging threats.
The Center for Internet Security is leading an effort to develop security benchmarks for medical devices, starting with insulin infusion pumps. Learn how the voluntary guidelines will be developed.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.