Good start, but we've still got a long way to go. This statement sums up industry experts' reactions to the two cyber fraud advisories issued this week to help organizations prevent ACH fraud and other crimes.
As the federal government attempts to crack down on Medicare and Medicaid fraud, officials have discovered that most medical schools don't offer training on how to comply with federal fraud and abuse laws.
In light of a survey confirming that medical students aren't getting enough training on how to comply with Medicare and Medicaid laws aimed at preventing fraud and abuse, federal authorities will prepare educational materials on the subject.
When it comes to business continuity and disaster recovery planning, it isn't the cause of the disaster that's the concern - it's the potentially devastating effects.
The level of application security threats is rising, but the level of response is not. "That's a serious disconnect," says Jeff Williams, chair of the OWASP Foundation.
To help fight fraud, computer scientists from the National Institute of Standards and Technology offer some insight on how to protect commercial and consumer computers from keylogger infection.
With baby boomers reaching the retirement stage, and the first throngs of Gen Y entering the information security workplace, the profession is evolving - and gaining new definition.
When it comes to business continuity and disaster recovery planning, it isn't the cause of the disaster that's the concern - it's the potentially devastating effects.
Investing in science, technology and math, not only will produce needed cybersecurity pros, but will generate stronger economic growth in the coming decade, says Patrick Gorman, former associate director of national intelligence.
Organizations today approach social media one of three ways: They embrace it, ignore it or are immobilized by it. The key to success is to manage the transition.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.