Because the nation lacks a single patient ID system, misidentification of patients is a danger when providers exchange records. That's why HIMSS has asked Congress to commission a patient data matching study.
Imagine sitting in a bar, as a stranger snaps a photo of you, and then uses that image to find out who you are using facial recognition technology. It's the type of practice that the staff of the U.S. Federal Trade Commission wants to discourage.
Employing cloud computing services could help organizations defend against the type of distributed denial of service attacks that have temporarily crippled the online service of major American banks, says NIST's Matthew Scholl.
State health insurance exchanges now in the formative stages should consider security practices widely used in online banking, says Bryce Williams, CEO at Extend Health, a commercial online health insurance exchange.
Researchers are studying how security best practices for healthcare organizations need to evolve. What current and emerging IT issues are they considering in their work? Researcher Carl Gunter explains.
Those who are implementing new health information exchanges should look for ways to leverage the best security practices of participating organizations, advises Chris Carmody, who heads a growing HIE in Western Pennsylvania.
What is the focus of new guidelines from the PCI Security Standards Council on mobile payment acceptance security? The council's Bob Russo and Troy Leach discuss key objectives - and what's coming next.
When it comes to fighting DDoS attacks, institutions must understand the threats against them, says Bill Wansley of Booz Allen Hamilton. Varying attack vectors require different modes of detection and prevention.
As mobile computing becomes ever-present, enterprises face a new threat landscape that includes rogue marketplaces, insecure public Wi-Fi and proximity-based hacking, says Dan Hubbard of the Cloud Security Alliance.