Although there's plenty of talk about cybersecurity threats involving devious international hackers, the real threat to the security of healthcare information, I believe, is staff members who aren't paying enough attention to the little details. The Gartner Group's John Pescatore said it well in a recent interview:...
A risk analysis should not be an annual event, but rather an ongoing process that's revisited whenever a healthcare organization adds or changes any application. That's the advice of Kenneth Bradberry, vice president and chief technology officer at ACS, a consulting firm recently acquired by Xerox.
The Healthcare Information and Management Systems Society is asking federal regulators to be much more specific about the information security requirements within the proposed "meaningful use" rule for the electronic health record incentive payment program.
The Medical Group Management Association and the American Medical Association offer very different assessments of the proposed security provisions in the "meaningful use" rule for the federal electronic health record incentive program.
Education and training are two of the key priorities of information security professionals and organizations in 2010. And professional certifications are at the heart of that training.
Building public trust, as called for under a draft of a federal "Health IT Strategic Framework," will require educating healthcare organizations on security compliance as well as tough enforcement of federal regulations, experts say.
The first draft of the framework correctly points out that public trust is vital...
UAB Health System in Birmingham, Ala., is tackling a long list of risk management projects, including updating intrusion detection and prevention systems.
In an interview, Terrell Herzig, HIPAA security officer, outlines priority projects and key lessons learned, including:
Expanding the use of...
The inspector general for the U.S. Department of Veterans Affairs is investigating a possible healthcare information breach involving a former employee's personal laptop comput
Michael Frederick, chief information security officer at Baylor Healthcare System in Dallas, is using the HITRUST Common Security Framework to help ease the task of complying with multiple regulations.
Finding the U.S. Department of Health and Human Services' list of major healthcare breaches is a chore. One consultant is calling on regulators to make the "wall of shame" far more prominent.
Hospitals preparing for a potential government audit of their HIPAA security rule compliance should "build a continual state of readiness," says David Wiseman, information security manager at Saint Luke's Health System, Kansas City, Mo.
Chief information security officers need to be able to translate technical projects into clear business terms, says Todd Fitzgerald, co-author of the book, "CISO Leadership Skills: Essential Principles for Success."
In an interview, Fitzgerald:
Describes the managerial skills that CISOs need;
Outlines how to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.