The Department of Veterans Affairs expects to accommodate the use of in excess of 100,000 iPads and iPhones within 18 months, including a mix of government-owned and personal mobile devices, says Roger Baker, CIO.
ID theft expert Joanna Crane wonders whether banks, government agencies and healthcare providers do enough to assist consumers with ID theft recovery, saying consumer expectations are often loftier than what's being done to meet the demand.
Heavily regulated industries like banking and healthcare have been reluctant to make the virtualized leap to the cloud, fearing a loss of control could open them to unforeseen risk. Are their concerns unfounded?
News this week about an "ethical hack" of a Medtronic insulin pump, which has a wireless transmitter, could prove to be a catalyst for ramping up efforts to protect the security of medical devices.
CIOs and CISOs face the overwhelming mission of safeguarding systems and data while fiscal shortfalls force significant consolidation and reengineering of IT programs and services.
New research from Carnegie Mellon University's Software Engineering Institute provides further evidence why IT security isn't just the problem of an enterprise's security organization but of its top non-IT leadership as well.
RelayHealth, a unit of McKesson that offers information exchange services, has won a contest designed to demonstrate implementation of the "Blue Button" approach to securely downloading certain patient records.
"We shouldn't make the false choice between security and innovation," Federal CIO Steven VanRoekel says. "In fact, innovation can make us more secure as long as we build security into everything we do."
As it seeks information from vendors about implementing a more robust mobile device management system to ensure security, the Department of Veteran's Affairs has reported its first case of a stolen iPad.
The Health Information Trust Alliance is seeking nominations for its annual InfoSec Awards, which recognize groundbreaking work in healthcare information security.
Many organizations have the expertise required to implement cyber intelligence but have yet to learn how to integrate those skill sets into an effective, end-to-end process, says Intelligence and National Security Alliance's Terry Roberts.
"Matching an implementation to the cloud definition can assist in evaluating the security properties of the cloud," says computer scientist Peter Mell, author of The NIST Definition of Cloud Computing.
A hacker anywhere in the world could easily track the whereabouts and file-sharing habits of a Skype user and use the information for purposes of stalking, blackmail or fraud.
The total number of Americans affected by major health information breaches since the HIPAA breach notification rule took effect could grow by more than 50 percent once two major recent incidents are added to the official federal tally.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.