While some healthcare organizations are quickly rolling out privacy and security policies for employee-owned mobile devices, others are moving slowly. What BYOD tips do healthcare security leaders offer?
How should organizations go about crafting a BYOD policy that addresses pertinent security and privacy issues? Attorney Stephen Wu offers advice to IT security leaders tasked with the project.
CISOs' top three priorities for 2013 are emerging threats, technology trends and filling security gaps, says RSA CISO Eddie Schwartz. But what new strategies should leaders employ to tackle these challenges?
House Cybersecurity Caucus Co-Chair Jim Langevin sees the new International Telecommunication Regulations, approved in Dubai earlier this month over the objections of the U.S., as a veiled threat to suffocate Internet freedom around the world.
The Government Accountability Office is preparing a comprehensive analysis of the nation's cybersecurity strategy to determine its effectiveness in securing government IT and critical information infrastructures.
In recent weeks, the federal tally of major health information breaches has been growing at a relatively slow pace. Is that evidence that healthcare organizations are getting better at preventing breaches?
Threats have evolved, and so have our Internet needs. This is why organizations need to explore the security and productivity gains of the next-generation firewall, says Patrick Sweeney of Dell SonicWALL.
A federal advisory panel will urge the Office of the National Coordinator for Health IT to provide physicians and hospitals with best practices for verifying the IDs of patients using web portals to access records.
"While these two priorities - sharing and safeguarding - are often seen as mutually exclusive, in reality they are mutually reinforcing," President Obama says in the introduction to the strategy.
When it comes to mobile security, users say the right things, but still indulge in risky behavior. Javelin's Al Pascual tells how security leaders can create better partnerships and practices in 2013.
The line between national security and civilian systems is a blurry one, says Franklin Reeder, a former OMB executive, who co-authored a report identifying ways to cross the line to defend both.
A breach that resulted in a $1 million HIPAA settlement led Partners Healthcare in Boston to take many significant steps, including merging its privacy and security efforts, says CISO Jennings Aske. More changes are planned for 2013.
The increase since 2006 in the number of IT security terms found in a new NIST glossary shows the importance of information security in the way we conduct business today.
A new training and testing program is being developed for a credential certifying expertise in healthcare information security. Learn why ISC2 and HITRUST are working together on the project.
The Walgreens drugstore chain will pay $16.6 million to settle a California case involving improper disposal of hazardous waste, as well as certain confidential patient information, in dumpsters near their stores.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.