Let's hope the final version of the Federal Health IT Strategic Plan for 2011-2015 contains more details about new privacy and security initiatives than the draft that was recently issued.
A survey of American households - the same one used to determine the national unemployment rate - shows that 37,000 individuals in the United States consider themselves as information security analysts.
Russ Jones of Albert Einstein Healthcare Network describes why the delivery system shifted from magnetic stripe cards to smart cards for a variety of applications.
A California hospital is notifying more than 514,000 patients of a breach of a limited amount of personal information stemming from the theft of an unencrypted computer.
From Facebook to Twitter, the new era of business communication and collaboration requires involvement of senior leaders to guide an organization's social media strategy and engagement. It's a big role, and it comes with significant responsibilities.
A malicious SQL injection known as Lizamoon could be affecting more than 1 million URLs, according to a blog posting by Patrik Runald, senior manager for security research at Websense, which offers Internet security products and services.
A proposed federal rule that would pave the way for formation of Accountable Care Organizations to coordinate care of chronically ill Medicare patients emphasizes the need to protect the privacy of information shared among ACO participants.
When it comes to privacy and security issues, a draft of a Federal Health IT Strategic Plan for 2011-2015 lacks vision and details, some observers say.
After the revelation of Operation Aurora, the term began to take on a different meaning. "In essence," IBM's X-Force report says, "APT became associated with any targeted, sophisticated or complex attack regardless of the attacker, motive, origin or method of operation."
Physicians implementing electronic health records should consider cloud computing as a way to improve security, says healthcare IT consultant Patricia Dodgen.
Although many hospitals and clinics are paying attention to HIPAA and HITECH Act compliance, they also need to train their staffs on how to crack down on identity theft and credit card fraud, security specialists say.
Three recent breach incidents, each involving the loss or theft of back-up drives, illustrate that some organizations are doing a better job than others in informing consumers about the steps they're taking to prevent more breaches.
Although many organizations are using encryption to protect data on mobile devices, they're often overlooking other important ways to prevent health information breaches, says Terrell Herzig, information security officer at UAB Medicine.
While Japan's nuclear emergency puts local citizens at risk, there is much that organizations globally can learn from the crisis. "I hope that all of us look at this and ask 'What can I do to be better prepared?'" says Regina Phelps, disaster recovery expert.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.