Sitting in an all-day security workshop at the HIMSS Conference in Atlanta Feb. 28 provided me with a good education about what's on the minds of security leaders. For example, one member of the audience said it was a "huge challenge" to ensure that when an employee is fired, their password is promptly deactivated so...
An association of healthcare CIOs has prepared a lengthy, harsh critique of proposed rules for the Medicare and Medicaid electronic health record incentive program.
The group advocates substantial revisions in the criteria for the incentives, which were created by the HITECH Act, as well as a much less aggressive...
Chief information security officers need to be able to translate technical projects into clear business terms, says Todd Fitzgerald, co-author of the book, "CISO Leadership Skills: Essential Principles for Success."
In an interview, Fitzgerald:
Describes the managerial skills that CISOs need;
Outlines how to...
The list of 36 recent major breaches of healthcare information posted on a government Web site likely represents a small fraction of the significant breaches in healthcare in recent months, security experts say.
The National Coordinator for Health Information Technology, David Blumenthal, M.D., has added Twitter to his communications arsenal. But how often will he tweet?
A while back, Dr. Blumenthal added "the Health IT Buzz Blog" to his Web site. But his blog entries have been few and far between. Let's hope Dr....
At a Senate hearing, Michael McConnell, the former director of national intelligence, added his voice to the growing chorus of cybersecurity experts who see dire consequences of a virtual attack on America's critical IT systems.
When it comes to protecting your organization and your customers from a data breach, what is considered "reasonable security?"
This question is at the center of several ongoing lawsuits, and how the courts answer it may be one of the biggest stories of 2010.
Shedding light on this hot topic is David Navetta,...
The Federal Trade Commission announced on Monday that is has notified nearly 100 organizations that their peer-to-peer (P2P) file-sharing networks have been sharing information with the wrong people.
Michael Frederick, chief information security officer at Baylor Healthcare System in Dallas, is using the HITRUST Common Security Framework to help ease the task of complying with multiple regulations.
In an interview, Frederick, who heads a staff of 22, describes how the framework is helping him achieve several...
Application security is rapidly becoming the next hot focus area for information security professionals.
Momentum began to build in 2008, when Information Security Media Group's (ISMG) Application Security Survey showed that 90% of respondents saw application security as somewhat or a significant part of their...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.