Farzad Mostashari, M.D., the national coordinator for health information technology, sees the exchange of health information as a way to improve care quality. But what's his vision for achieving truly secure data exchange?
We talk increasingly about what we have in common - global risks, threats and growing an effective security workforce. But what are the unique characteristics of individual marketplaces? That's a question I hope to answer this week in London.
When a health information exchange shuts down, what happens to the patient data that was stored and shared? The leader of a recently closed HIE in Wisconsin explains its approach.
The hunt for a Boston Marathon bombing suspect that locked down the city caused massive disruption to business operations, but enterprises that had business continuity plans in place hardly missed a beat.
A new survey reveals the willingness of consumers to accept other authentication factors beyond username and password, even if they require more work on their part.
Nation-state threats get the headlines, but where do most attacks against U.S. organizations truly originate? New insights from Solutionary's 2013 Global Threat Intelligence Report may surprise you.
Ignoring a White House threat to veto the Cyber Intelligence Sharing and Protection Act, the House of Representatives overwhelmingly approved the bill known as CISPA, sending the measure to the Senate.
When it comes to HIPAA Omnibus Rule compliance, smaller physician practices must guard against complacency because they could be held accountable, warns compliance expert Marjorie Satinsky.
Does legislation designed to get businesses and governments to share cyberthreat information provide adequate civil liberties protections? Find out what's at the heart of the debate.
To retain their customers after a breach of sensitive information, organizations should take the extra step of calling those affected to offer free credit protection services, says security expert Brian Dean.
Healthcare CIOs need to take a clear leadership role on privacy and security matters, including compliance with the HIPAA Omnibus Rule, says Russ Branzell, the new head of CHIME, a CIO association.
To meet Obama administration concerns, the House sponsors of the Cyber Intelligence Sharing and Protection Act amended the bill. But a White House spokesman says those changes didn't go far enough to protect citizens' privacy and civil liberties.
The Federal Information Security Amendments Act would require agencies to continuously monitor their IT systems for cyberthreats and implement regular threat assessments.
Expanding the use of encryption is a top breach prevention step for 2013, the Healthcare Information Security Today survey confirms. And CISO Eric Cowperthwaite says a risk assessment is essential for setting encryption priorities.
The rush to find qualified IT security professionals to meet current cyberthreats could jeopardize IT systems' security in the not-too-distant future, say two leading IT security experts, Eugene Spafford and Ron Ross.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.