When preparing for a potential HIPAA compliance audit, former HIPAA enforcer Adam Greene advises healthcare organizations: "Don't panic. I'm skeptical if it's possible for an organization to be 'audit-proof.' If you try to scramble and get everything in order, you may fail."
"The need for fraud-prevention tools increases during times of recession," says Aite Group's Julie McNelley, who does not believe this week's economic shockwaves will hurt organizations' security priorities.
ISACA's Marc Vael says differences in cloud computing environments and cloud providers can pose security risks. But well thought-out contracts and risk-management plans can fill potential security gaps and ensure business continuity during outages and disasters.
The HHS Office for Civil Rights should carefully consider comments received on its proposal to require healthcare organizations to provide patients with a complete list of everyone who has electronically viewed their information.
The soon-to-be-launched HIPAA compliance audit program likely will initially offer comprehensive assessments of compliance with the HIPAA privacy and security rules, rather than focusing on specific narrower issues, says Susan McAndrew of the HHS Office for Civil Rights.
Steven VanRoekel joined the Obama administration in 2009 as the managing director of the Federal Communications Commission and worked in various managerial and staff positions at Microsoft for 15 years.
Fears that the global economy is nearing yet another recession have led to nosedives for U.S. and European stocks. The Dow Jones Industrial Average fell nearly 513 points - the worst plunge the Dow has seen since Sept. 29, 2008.
The cyber threat landscape is more widespread than ever before, and cybersecurity professionals are needed in all sectors, from government to private industry, says Dickie George of the National Security Agency.
No two fraud incidents may be exactly alike, but a fraud investigator's approach can still be very consistent and precise, says Jean-Francois Legault, a fraud investigations specialist with Deloitte and Touche.
"The timing and the targets point to China," says cybersecurity policy expert James Lewis. "Spying right before the Beijing Olympics and focusing on Southeast Asia reflects China's larger interests more than those of any other country."