Health information exchanges that have received federal funding now have a new set of federal recommendations for privacy and security policies and procedures.
Today's threat landscape is challenging enough. But what happens when organized crime adopts the techniques developed by hacktivists? Learn more about the top 10 threats to security by 2014.
The Health Information Trust Alliance is seeking participants in a new working group that will help incorporate privacy requirements into the HITRUST Common Security Framework.
Information Security Media Group announces the launch of two new weekly newsletter tracks representing its DataBreachToday and InfoRiskToday media sites. Click for details on how to subscribe.
An omnibus package of regulations that includes a final version of extensive HIPAA modifications, which have been pending since 2010, as well as a final version of the HIPAA breach notification rule has moved one major step closer to completion.
Organizations and leaders seeking to assure the privacy of their customers should implement privacy by design in the development process, privacy lawyer Alan Friel says.
The FTC proposes that privacy protections be built at every stage in developing online products and consumers be given the option to decide what information is shared about them and with whom through a do-not-track system.
The federal "wall of shame" tally of major healthcare information breaches has been growing relatively slowly the past two months. But why did the number of individuals affected by breaches grow so much in 2011?
Increasingly, social engineers target unwitting insiders to plunder organizations' financial and intellectual assets. How can you prevent these and traditional inside attacks? CMU's Dawn Cappelli offers tips.
The ECRI Institute recently published a report on controlling the risks involved in using social media in healthcare. Read on to discover insights on how to address risks and prevent breaches.
As one team of researchers analyzes a new version of Duqu, a worm related to the Stuxnet Trojan blamed for disabling Iranian centrifuges used to enrich uranium, other researchers zero in on who is behind the worm discovered last fall.
The average per capita cost of a data breach has declined from $214 to $194, according to the new Cost of a Data Breach study. But there are still plenty of causes for concern, says Dr. Larry Ponemon.
As the use of mobile devices explodes and health information exchanges gear up, it's time to consider whether adequate privacy and security measures are in place.
A recent research paper that raised questions about the efficacy of RSA public-private key cryptography shouldn't alarm IT security practitioners, says Eugene Spafford of Purdue University. Here's why.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.