Widespread implementation of encryption is a top priority at Stanford Hospital and Clinics, thanks, in large part, to the "safe harbor" in the HITECH breach notification rule, says Michael Mucha, information security officer.
The firm that has won a $26 million public relations contract from the Department of Health and Human Services for a campaign on healthcare information technology, and related privacy and security issues, stirred up controversy with some of its previous government PR efforts.
Shifting from desktop PCs to thin clients can provide a more secure way for clinicians to access electronic health records, says Dee Cantrell, R.N., chief information officer at Emory Healthcare in Atlanta.
In an interview, the CIO of the integrated delivery system, which is affiliated with Emory University and...
Insider crimes are among the biggest threats to public and private sector organizations. And yet too many groups continue to struggle to prevent or even detect these crimes.
In an exclusive interview, Dawn Cappelli of Carnegie Mellon University's Software Engineering Institute, discusses:
Interview with Gartner's Roberta Witty
Organizations have made strides in business continuity/disaster recovery (BC/DR) planning. But BC/DR professionals need to sharpen their business skills to truly protect their organizations.
This is the stance taken by Roberta Witty, research VP at Gartner. In an exclusive...
Federal regulators are one small step closer to starting audits of healthcare organizations and their business associates for compliance with the HIPAA privacy and security rules as required under the HITECH Act.
The Office for Civil Rights at the U.S. Department of Health and Human Services has awarded two key...
Organized crime has targeted healthcare organizations for insurance fraud scams. What are the risks? What are the solutions?
Dr. Andrea Allmon, senior director with FICO, discusses:
Insurance fraud trends;
How organizations are most vulnerable;
What to do now to reduce fraud today.
The final version of regulations to carry out the HITECH Act must include far more details on privacy and security to ensure widespread adoption of electronic health records, says William R. Braithwaite, M.D., Ph.D.
Getting senior executives involved early and making sure they understand the organization's security vulnerabilities are two vital steps in any risk management initiative, says Mark Ford of Deloitte.
In an interview, Ford offers advice on how to:
Win the support of senior executives as well as boards of directors...
Interview with H. Peet Rapp of ISACA's Cloud Work Group
Everyone is talking about cloud computing these days - but are they having the right conversations?
H. Peet Rapp is an information security auditor who sits on ISACA's Cloud Computing Work Group, and he's co-author of the white paper Cloud Computing:...
Connecticut Attorney General Richard Blumenthal has launched an investigation into an apparent breach by a radiologist who was taking information from one hospital where he formerly worked and using it to drum up business at another hospital.