Information security poses a major challenge to the widespread adoption of cloud computing, yet the Cloud Security Alliance, an association of cloud stakeholders, sees the cloud as a provider of information security services.
A look at the health information breach statistics and the lessons learned - including the value of encryption - two years after the HITECH Act breach notification rule took effect.
Disaster preparedness has come a long way since the 9/11 terrorist attacks, but most organizations are still missing the mark, says Kevin Sullivan, former investigator with the New York State Police.
Mobile apps and smartphone security are increasing global concerns. But Dr. Giles Hogben of ENISA says mobile malware mania is a bit overhyped, since mobile is actually more secure than most other platforms currently on the market.
Healthcare organizations need to take five key steps to prepare for the upcoming HIPAA compliance audit program, says compliance specialist Bob Chaput.
News about recent healthcare information breaches offers an important reminder: Monitoring the privacy and security procedures of your business associates should be a vital component of any breach prevention strategy.
Requiring even limited use of metadata tags for stage two of the HITECH Act's electronic health record incentive program is premature and inappropriate, three associations have told federal authorities.
Known as "recursion" among his LulzSec compatriots, Cody Kretsinger is among the hacking group's members responsible for the breach of Sony Pictures Entertainment computers between May 27 and June 2, according to federal authorities.
It's been well over a year since the passage of the Dodd-Frank Wall Street Reform and Consumer Protection Act. How should banking institutions prepare for the hundreds of new regulations expected to come as a result of this landmark legislation?
The breach earlier this month of certificate authority DigiNotar could prove to be the worst security event ever to happen on the Internet because it threatens, at its core, a fundamental principle of Internet transactions - economic and social - trust.
Take a look at the contract that the Department of Health and Human Services entered with KPMG to conduct HIPAA compliance audits and you'll get a few insights on what healthcare organizations can expect.
A breach involving the theft of an unencrypted hard drive from a car has affected more than 82,000 patients treated at healthcare systems in New Jersey and Illinois.
The Office of the National Coordinator for Health IT has launched a project designed to test sharing only portions of patients' electronic health records among providers to help assure privacy.
The Dutch company that was deceived by hackers into issuing fraudulent digital certificates is liquidating its assets under the protection of a bankruptcy court in the Netherlands after failing to recover from the attack.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.