The Wyoming Department of Health reports that personal information about clients and applicants for the state's Children's Health Insurance Program, known as Kid Care, was improperly appearing in Google search results.
Envelopes mailed Feb. 1 to nearly 50,000 Californians included their Social Security numbers on the mailing labels, according to the California Department of Health Care Services.
On Feb. 6, the state agency began sending notification letters to the adult day health care services beneficiaries notifying them of the...
If you need one more reason to comply with the breach notification provisions of the HITECH Act, here it is: Enforcement begins February 22. After years of lax enforcement of the Health Insurance Portability and Accountability Act's privacy and security rules, HITECH spells out several tough enforcement measures,...
It's hard to place a value on an intrusion detection system until you see the system in action. CIO Charles Christian at Good Samaritan Hospital in Vincennes, Ind., recently discovered just how worthwhile his intrusion detection investment really is.
(Part three)
The most significant security provision of the HITECH Act is its explicit requirement for healthcare organizations to promptly notify individuals of data security breaches.
I'm excited about today's launch of the 2010 Banking Information Security Today Survey, and you should be, too.
Think about it: Identity theft, fraud, regulatory compliance, vendor management, security awareness, risk management, privacy. These topics have no industry loyalty; they're common to all public and...
Welcome to HealthcareInfoSecurity.com, a media site with news, insights and education on healthcare privacy, risk management and information security.
Information Security Media Group, which offers similar information security/risk management sites for banking, credit unions and government, brought me on board to...
Some healthcare organizations saw a doubling in hacker attacks in the fourth quarter of 2009, according to a small study of customers of SecureWorks Inc., an Atlanta-based information security services company.
I'm sorry, but weren't we just celebrating the holidays?
Unbelievable how fast the New Year has flown by already. It seems like we're all trying to get 12 months worth of work done in one.
Malicious criminal attacks have doubled, and the average cost of a data breach has increased to $204 per compromised record.
These are the headlines from the 5th annual "Cost of a Data Breach" study by the Ponemon Institute.
One of the nation's best-known healthcare data security experts who's advising federal regulators on policy issues offers advice to organizations preparing to comply with the data breach notification requirements of the HITECH Act.
In an interview, Dixie Baker of SAIC advises hospitals and others to:
Study how...
What's the cost of a data breach?
The Ponemon Institute is out with its 5th annual "Cost of a Data Breach" study, and in an exclusive interview Dr. Larry Ponemon discusses:
The current cost of a data breach - and how it's risen since 2009;
Data breach trends across industry;
What organizations should do to...
Faced with the threat of much stiffer penalties for data security violations and ramped-up enforcement at the federal and state levels, many hospitals are just starting to pay serious attention to security, contends consultant Kate Borten. But they must go far beyond investing in new technologies to develop...
In 10 years as a security compliance officer, Christopher Paidhrin has seen his role broaden as data security has become an even higher priority at Southwest Washington Medical Center in Vancouver, Wash.
Today, Paidhrin is more involved in policy development. He's also pushing to improve awareness of the policies...
Hospitals and other healthcare organizations need to identify data security breaches "in a much more systematic way" to help ensure the privacy of personal information. That's the advice of Lisa Gallagher, senior director for privacy and security at the Healthcare Information and Management Systems...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.