How vulnerable are organizations to cyber attack? It depends on your definition of "vulnerable," says Robert Richardson, Director of the Computer Security Institute (CSI). "There's vulnerable," he says, "and then there's likely to be attacked."
In an interview about current threats, Richardson...
How do CIOs at community hospitals, which have limited resources, address data security challenges, such as compliance with the privacy and security provisions of the HITECH Act?
Charles Christian, CIO at Good Samaritan Hospital in Vincennes, Ind., also serves as the defacto chief security officer, dividing up...
In 10 years as a security compliance officer, Christopher Paidhrin has seen his role broaden as information security has become an even higher priority at Southwest Washington Medical Center in Vancouver, Wash.
Today, Paidhrin is more involved in policy development. He's also pushing to improve awareness of the...
It's hard to place a value on an intrusion detection system until you see the system in action. CIO Charles Christian at Good Samaritan Hospital in Vincennes, Ind., recently discovered just how worthwhile his intrusion detection investment really is.
Every IT vulnerability survey of the past 10 years has had the same item at the top of the list: internal personnel our so-called trusted workers. Billions of dollars, countless vulnerability assessments, thousands of innovative security solutions later, and we still haven't moved the trusted worker off the top of the...
Whether a hospital has a chief information security officer is dependent, in large part, on the size of the facility.
For example, while many academic medical centers have a CISO and a team of security experts, many community hospitals, faced with budget constraints, do not. Instead, the CIO and members of his...
Some healthcare organizations saw a doubling in hacker attacks in the fourth quarter of 2009, according to a small study of customers of SecureWorks Inc., an Atlanta-based information security services company.
It's one of the newest and most popular stops on the Washington, D.C. tour, and its artifacts of history leave clues for how information security professionals should approach their future.
The International Spy Museum has just celebrated its 7th year and its 5 millionth visitor, says Executive Director Peter...
The National Cryptologic Museum (NCM) is the National Security Agency's principal gateway to the public, opening its doors in December 1993. Located adjacent to NSA Headquarters in Ft. George G. Meade, MD., the museum houses thousands of artifacts that collectively serve to sustain the history of the cryptologic...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.