NIST will soon start writing the "final" version of its cybersecurity framework, a guide to information security best practices for operators of the nation's critical infrastructure. But should it be beta tested?
Joy Pritts, chief privacy officer at the Office of the National Coordinator for Health IT, offers insights on the best ways to prevent data breaches involving lost or stolen devices or records snooping.
Business associates have been involved with fewer major health data breaches so far this year, compared with 2012. Are they getting better at prevention, or are they just under-reporting breaches?
Figuring out how Edward Snowden breached NSA computers is sort of like solving a puzzle. Take public information and match it with an understanding of how organizations get hacked, and the pieces seem to fall into place.
When health information breaches involving identity theft occur, problems can resurface for patients and providers. Find out how some Sutter Health patients are still being victimized.
Attorneys discuss the significance of the 10-year prison sentence for hacker Jeremy Hammond, who pleaded guilty in connection with a 2011 breach of Stratfor, a global intelligence firm that provides services to the U.S. government.
A North Carolina state website that provides the public with transparency into government spending inadvertently listed personal data on 1,300 patients. A security expert offers insights on preventing such breaches.
Now that business associates are directly liable for HIPAA compliance, they need to ensure they perform a thorough risk analysis to identify gaps in their controls, says consultant Andrew Hicks.
Top Obama administration IT leaders testified to a Congressional committee Nov. 13 about the technical woes of the HealthCare.gov website. Learn what they had to say about important security issues.
When it comes to safeguarding the privacy and security of healthcare information, smaller clinics, as well as patients who use telehealth technologies, face considerable challenges because of a lack of expertise, says researcher David Kotz.
Tackling medical ID theft committed by insiders requires a multi-pronged approach with a variety of controls tailored specifically to each organization, says former prosecutor Maureen Ruane.
An auditor's investigation into a breach at Minnesota's health insurance exchange before it opened for consumers pinpoints several mistakes. The auditor also urges other exchanges to ramp up security.
Organizations must guard against making three common mistakes when conducting an investigation of a data breach or fraud incident, says attorney Kim Peretti, a former Department of Justice cybercrime prosecutor.
The number of reported breaches is up considerably this year, but so is the overall quality of organizations' breach preparedness, says Michael Bruemmer of Experian Data Breach Resolution.
Information Security Media Group is offering a growing list of fraud-fighting educational opportunities, including videos of presentations at its recent Fraud Summit plus a series of 2014 summits.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.