At St. Dominic-Jackson Memorial Hospital in Mississippi, a proactive breach prevention strategy has dramatically reduced privacy violations involving nosy healthcare workers inappropriately accessing medical records.
The University of Texas MD Anderson Cancer Center has reported its second data breach in recent weeks involving an unencrypted mobile device. Find out the details.
Secure is a possible state of affairs at a certain point in time. But rugged describes staying ahead of the threat over time. Rugged organizations create secure code as a byproduct of their culture.
A new House bill that would let VA doctors treat veterans across state lines via telemedicine opens up questions about how state privacy laws might apply to physicians in the event of a breach.
In this week's breach roundup, read about the latest incidents, including a stolen laptop affecting patients of Apria Healthcare and gaming company Blizzard reporting a breach of its servers.
When two organizations merge, their top security/privacy challenge doesn't necessarily involve technology. Sometimes it's culture, says Christopher Paidhrin of PeaceHealth Southwest Medical Center.
U.S. information breaches involving third-party business associates doubled in the first half of the year, says Karen Barney of the Identity Theft Resource Center. Find out the other results of the group's breach study.
Playing by the rules is tough if the rules aren't available. That's why it's essential that federal authorities release a long list of pending regulations that affect privacy and security.
Understanding threats and identifying modern attacks in their early stages is key to preventing subsequent compromises, and proactively sharing information among organizations is an increasingly effective way to identify them.
In this week's breach roundup, read about the latest incidents, including Stanford Hospital reporting a second breach in less than a year and a stolen thumb drive affecting 14,000 Oregon patients.
More organizations are expected to purchase cyber insurance in the coming years as risk managers become more involved in buying these types of policies.
The United Kingdom and the United States are both cracking down on healthcare organizations that have experienced information breaches. But they're taking very different approaches. Which approach will prove most effective?
John Halamka, M.D., CIO at Beth Israel Deaconess Medical Center in Boston, describes an 18-month privacy and security compliance effort that includes a focus on mobile device security.
Security personnel should be required to prove not only that they know how to do things right, but also that they know how to do the right thing. They must demonstrate commitment to ethical behavior.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.