A new guide has been released by the Information Commissioner's Office to help small and mid-sized businesses improve their IT security. Which threats should most concern them, and how can they use the guide?
A data scientist is a new breed of database professional who applies scientific analysis to large data sets to identify patterns and vulnerabilities. Here are five expert tips on how to qualify for the new role.
In a tribute, we remember Terrell Herzig, information security officer at UAB Health System, an innovator who was passionate about sharing best practices for protecting sensitive information.
Information security isn't just the domain of those branded information security professionals but also requires the knowledge of nearly every other IT occupation as well as individuals in many non-technology jobs, too.
People receiving IT security graduate degrees are highly educated, but as the Center for Internet Security's William Pelgrin says, "We have a deficit of those individuals who can pick up the ball and run with it very quickly." He's doing something about that.
"Without combining relevant data sets impacting the network, security professionals will fail in characterizing threats and targeted intruder activity," says Ed Stoner, a senior Carnegie Mellon researcher.
In the wake of the Supreme Court ruling, security and privacy leaders need to forge ahead with initiatives that were left in limbo while the court weighed the constitutionality of the healthcare reform law.
The UK Information Commissioner's Office has released a new security guide for small and midsized businesses. Simon Rice of the ICO discusses the guide and how to use it to avoid being breached.
Occupational fraud is quite possibly the largest form of fraud, says John Warren of the ACFE. So how can organizations spot the potential fraudsters and prevent their crimes? Warren shares insights.
Gartner's Tom Scholtz doesn't see a shortage of technically skilled IT security practitioners. But he perceives a dearth of infosec pros who truly understand how security links to an enterprise's business goals.
Owners of critical infrastructure might be shamed into providing the necessary security to safeguard their information assets. That's one takeaway of a compromise Senate bill proposed by Democrat Sheldon Whitehouse and Republican Jon Kyl.
June has been declared National Internet Safety Month. What is the mission behind the designation, and how can individuals and organizations contribute to the "Stop, Think, Connect" campaign?
A new report from two consumer advocacy groups identifies seven gaps in privacy protections that policymakers need to address to help support electronic health information exchange.
It's the everyday attacks, not the Flames, that are most likely to put an organization's IT infrastructure in jeopardy. Here is advice for how organizations can staff up and improve cybersecurity.
Developing a culture of responsibility could go a long way in helping business, not-for-profits and governments secure their organizations' information resources.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.