Connecticut is working to improve its cyber incident response, including updating its breach notification law and enacting a privacy task force. Connecticut Attorney General George Jepsen explains why.
Staff education and a mobile device management system are critical to minimizing BYOD risks at healthcare organizations, says security consultant Tom Walsh. Find out his other mobile security tips.
As the remnants of Hurricane Sandy move north and west, IT security leaders and staff help pull together resources to make sure key systems remain available and secure.
It's been compared to the 'perfect storm,' but Hurricane Sandy is unlike any storm we've seen, says Alan Berman of DRI. He believes organizations have planned well for recovery.
"We will bring in best practices for HIPAA and technology best practices in terms of encryption in how we handle data and share it with stakeholders," says Curt Kwak CIO of Wash. State Health Benefit Exchange.
As Hurricane Sandy bears down on the U.S. east coast, many government offices, businesses and schools have closed. Organizations will soon learn: Are their business continuity plans sufficient?
The Department of Veterans Affairs is not taking adequate steps to protect the privacy of sensitive information that's shared with researchers, according to a new OIG report. Find out what the OIG recommends.
Hurricane Sandy threatens buildings, staff and data alike, posing a daunting challenge to business continuity pros. Disaster recovery expert Regina Phelps offers tips for weathering the storm.
How should organizations considering cyber insurance start the process? Cyber liability lawyer Richard Bortnick offers three steps in determining the type of cyber liability coverage they should seek.
Defending Delaware's critical infrastructure is a top challenge since a large part is owned by the private sector, says State Homeland Security Adviser Kurt Reuther, who details the challenges.
Human genome sequencing can support groundbreaking research leading to improved treatments. But before genetic testing can become common, privacy issues need to be tackled, says Lisa M. Lee, who heads a presidential advisory panel.
How can hospitals and physicians prepare to comply with the HITECH Act electronic health record incentive program's Stage 2 privacy and security requirements? Federal privacy officer Joy Pritts provides insights.
Identity theft is a concern for organizations across all sectors. Learn how healthcare entities are employing new strategies and technology tools to curtail medical ID theft and prevent fraud.
In this week's roundup, read about the latest incidents, including a stolen laptop affecting 27,000 patients in Tennessee and a point-of-service device breach at Barnes & Noble book stores.
President Obama has not yet reviewed the draft of a proposed executive order to create a process to establish IT security best practices that private owners of critical infrastructure could voluntarily adopt, DHS Secretary Janet Napolitano says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.