Breaches can happen even when there are strong protections in place. But healthcare organizations can do more to prepare for breaches and respond in the best possible way to protect patient information.
As the use of consumer health devices and applications grows, so do privacy and security concerns, says a new Federal Trade Commission report. Learn about the precautions the FTC recommends.
Lawmakers are more serious than ever about cybersecurity legislation. Their intent is to enact, but can they compromise on legislation to share cyberthreat information and nationalize data breach notification?
Data breaches are inevitable, hence it's up to executives to ensure their enterprise is secured, without trying to encrypt everything, warns Prakash Panjwani, president and chief executive officer of SafeNet.
In the wake of an "inebriated" government employee crashing a drone on the White House lawn, federal officials sound warnings over the potential weaponization of consumer drones. But is it anything more than a Hollywood-style movie plot?
The Malaysia Airlines website was the victim of an apparent DNS settings attack on Jan. 26, for which the hacking group Lizard Squad claimed credit. The hacking group began leaking some travelers' itineraries.
As the number of major health data breaches continues to climb, federal regulators are taking steps to make the process of reporting breaches using online tools more efficient, hoping that will help ease the launching of investigations.
The recent hack attacks targeting Sony Pictures and the U.S. Postal Service illustrate why all organizations - and not just healthcare entities - need to make safeguarding health-related information a top priority, says attorney Susan A. Miller.
Cybersecurity has been a priority of the Obama presidency from the get-go. But do all of his cybersecurity actions, unprecedented among American presidents, make him a cybersecurity leader?
President Obama urged Congress in his State of the Union address to pass legislation to better meet the evolving cyberthreat, but spent very little of the speech explaining its dangers or detailing his cybersecurity legislative agenda.
In the aftermath of a payment card breach, as fraudsters race to exploit the stolen information, card issuers and affected customers take steps to mitigate risks. Here's a look at the lifecycle of a payment card breach from three perspectives.
The U.S. likely won't complete its implementation of EMV for many years to come, despite the October 2015 liability shift date for counterfeit card fraud, many forecasters say. And until it's fully deployed, EMV will have little impact on fraud.
New York State Attorney General Eric Schneiderman proposes updating state law to require businesses, including out-of-state firms with New York customers, to implement new safeguards to protect personal consumer data they store.
ENISA - the EU agency responsible for bolstering European cybersecurity practices - is calling on Internet infrastructure providers to adopt best practices for combatting routing threats, DNS spoofing and poisoning attacks, as well as DDoS disruptions.
The FBI's attribution of the attack against Sony Pictures Entertainment to North Korea was based, in part, on NSA intelligence gleaned from the agency having infected a significant number of North Korean PCs with malware, a news report says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.