How vulnerable are organizations to cyber attack? It depends on your definition of "vulnerable," says Robert Richardson, Director of the Computer Security Institute (CSI). "There's vulnerable," he says, "and then there's likely to be attacked."
In an interview about current threats, Richardson...
Interview with Allan Bachman of the Association of Certified Fraud Examiners
The magnitude of fraud schemes has grown - the scale and the losses. But the basics of fraud investigation remain sound. And if there's one thing people should know up front, says Allan Bachman of the Association of Certified Fraud...
The South Carolina Department of Health and Environmental Control is wrapping up notification of nearly 3,000 individuals about a breach stemming from documents that were improperly discarded in a recycling bin rather than shredded.
Shifting from desktop PCs to thin clients can provide a more secure way for clinicians to access electronic health records, says Dee Cantrell, R.N., chief information officer at Emory Healthcare in Atlanta.
Just how common are information breaches at hospitals? That depends on which survey you believe.
For example, a survey of 220 hospitals released April 20 found that 84 percent of U.S. hospitals have at least one breach incident a year, and 42 percent have at least 10 incidents. Earlier this month, another survey...
A review of this week's top news items, including:
Breach Alert: Copiers Are a Risk
HITECH Act Compliance for Business Associates
Privacy Concerns a Roadblock to PHRs
After listening to this overview, be sure to check out all of the week's news and views at HealthcareInfoSecurity.com
When will federal regulators draft long-awaited privacy and security rules for personal health records? So far, officials at the Department of Health and Human Services are being tight-lipped on the subject. Asked about the status of the rules, which, under the HITECH Act, were due in February, an HHS spokesman would...