In a tribute, we remember Terrell Herzig, information security officer at UAB Health System, an innovator who was passionate about sharing best practices for protecting sensitive information.
Information security isn't just the domain of those branded information security professionals but also requires the knowledge of nearly every other IT occupation as well as individuals in many non-technology jobs, too.
A new GAO report criticizes HHS for its tardiness in issuing guidance for how to de-identify patient data. The report also calls on HHS to spell out plans for continuing its HIPAA compliance audit program beyond this year.
The Markle Foundation has updated its guidance on health information exchange privacy and security issues to help HIE organizers and participants develop an environment of trust. Learn about the latest recommendations for policies and practices.
Marcus Ranum isn't shy about saying online authentication methods are outdated and insecure. Passwords will get breached, but organizations can do more to protect their users and online databases.
An Obama administration memo, issued by U.S. Special Counsel Carolyn Lerner, cautions federal agencies that interfering with e-mails used by government employees to unveil misconduct could be unlawful.
LinkedIn's failure to comply with long standing industry standard encryption protocols jeopardized its users' PII, and diminished the value of the services, the class action federal lawsuit filed in northern California says.
A new report from two consumer advocacy groups identifies seven gaps in privacy protections that policymakers need to address to help support electronic health information exchange.
FTC settlement agreements in two cases involving data exposed on peer-to-peer networks offer a reminder of the risks involved in using the networks. Social Security numbers, healthcare information and other personal details were exposed.
If you'd like to avoid being subjected to a federally mandated biennial data security audit for the next 20 years, you might want to make sure no one in your organization is using peer-to-peer networks.
Expectations clashed with reality during Howard Schmidt's 28-month tenure as the White House's first cybersecurity coordinator, a job he is slated to leave in mid-June.
Yet another high-profile breach involving a stolen unencrypted laptop is prompting Sen. Al Franken, D-Minn., to consider whether the nation needs an encryption mandate for healthcare information.
Those involved in developing health information exchanges can take advantage of a new resource from the Markle Foundation offering guidance on key issues, including privacy and security.
It's been six years since the Department of Veterans Affairs experienced a huge breach. What breach-prevention steps has the VA taken since then, and what's left to be done?
The Obama Administration has unveiled a "digital government" strategy that requires federal agencies to launch new mobile applications. The strategy calls for standardized implementation of privacy controls.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.