Because the nation lacks a single patient ID system, misidentification of patients is a danger when providers exchange records. That's why HIMSS has asked Congress to commission a patient data matching study.
Imagine sitting in a bar, as a stranger snaps a photo of you, and then uses that image to find out who you are using facial recognition technology. It's the type of practice that the staff of the U.S. Federal Trade Commission wants to discourage.
Employing cloud computing services could help organizations defend against the type of distributed denial of service attacks that have temporarily crippled the online service of major American banks, says NIST's Matthew Scholl.
State health insurance exchanges now in the formative stages should consider security practices widely used in online banking, says Bryce Williams, CEO at Extend Health, a commercial online health insurance exchange.
Top executives must be transparent with their stakeholders when their IT systems get attacked. Otherwise, their enterprises' reputations could be more severely damaged, says IBM Fellow Luba Cherbakov.
Researchers are studying how security best practices for healthcare organizations need to evolve. What current and emerging IT issues are they considering in their work? Researcher Carl Gunter explains.
Windows 8 is coming and includes security upgrades. How should security and technology leaders approach Microsoft's updated operating system? Forrester analyst Chenxi Wang offers recommendations.
After being criticized for how it handles incidents involving medical devices affected by information security issues, the Food and Drug Administration is planning to take action.
Those who are implementing new health information exchanges should look for ways to leverage the best security practices of participating organizations, advises Chris Carmody, who heads a growing HIE in Western Pennsylvania.
What is the focus of new guidelines from the PCI Security Standards Council on mobile payment acceptance security? The council's Bob Russo and Troy Leach discuss key objectives - and what's coming next.
The Department of Veterans Affairs will test-drive up to 5,000 tablets and smart phones in pilots during the next six to 12 months before ramping up its use of the devices. Learn about the strategy.
A new report by a presidential commission says there are too many discrepancies in privacy regulations related to patients' genomic data. Find out what the panel recommends.
When it comes to fighting DDoS attacks, institutions must understand the threats against them, says Bill Wansley of Booz Allen Hamilton. Varying attack vectors require different modes of detection and prevention.
The biggest social media concern for risk managers is the potential reputational impact to the organization, says risk expert David Bradford, who outlines mitigation steps.
As mobile computing becomes ever-present, enterprises face a new threat landscape that includes rogue marketplaces, insecure public Wi-Fi and proximity-based hacking, says Dan Hubbard of the Cloud Security Alliance.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.