The ECRI Institute recently published a report on controlling the risks involved in using social media in healthcare. Read on to discover insights on how to address risks and prevent breaches.
As one team of researchers analyzes a new version of Duqu, a worm related to the Stuxnet Trojan blamed for disabling Iranian centrifuges used to enrich uranium, other researchers zero in on who is behind the worm discovered last fall.
The average per capita cost of a data breach has declined from $214 to $194, according to the new Cost of a Data Breach study. But there are still plenty of causes for concern, says Dr. Larry Ponemon.
As the use of mobile devices explodes and health information exchanges gear up, it's time to consider whether adequate privacy and security measures are in place.
A recent research paper that raised questions about the efficacy of RSA public-private key cryptography shouldn't alarm IT security practitioners, says Eugene Spafford of Purdue University. Here's why.
Although fewer than the planned 150 HIPAA compliance audits will be conducted this year, the audit program likely will continue in 2013, says Leon Rodriguez, the nation's lead HIPAA enforcer.
The Medicaid Integrity Contractor Audit Program is doing an inadequate job of identifying overpayments related to fraud and other reasons, according to a new report.
Verizon's 2012 Data Breach Investigations Report shows dramatic increases in attacks linked to hacktivist groups like Anonymous and LulzSec. How should organizations respond to this evolving threat?
Army Gen. Keith Alexander, the head of the U.S. military's Cyber Command and National Security Agency, paints a bleak picture with mounting challenges to the Defense Department's and nation's IT systems at a House hearing.
Managers hiring millennials, young workers who bring a new set of skills to the workplace, should take three steps to help ensure the new staff members' success.
Health information exchanges should obtain patient permission before they take any steps toward making medical records available for potential exchange, according to a new report from the New York Civil Liberties Union.
Four U.S. senators have introduced legislation that would require unique identifiers for implantable medical devices and ongoing monitoring of the devices for safety issues.
The Privacy and Security Tiger Team soon will provide specific recommendations on how the proposed rules for Stage 2 of the HITECH Act electronic health record incentive program should be refined.
Although the Obama administration's recently announced Consumer Privacy Bill of Rights shouldn't be seen as the "be-all, end-all," says privacy and data security lawyer Lisa Sotto, they are an important step forward in getting industries and leaders to start thinking about privacy more seriously.
Many healthcare organizations are ramping up their use of mobile devices before they have appropriate privacy and security policies, procedures and technologies in place, some experts say.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.