Learn why the CEO of HealthInfoNet, Maine's statewide health information exchange, is a strong advocate of the centralized data architecture model to help standardize security controls.
Advice from the report, Bring Your Own Device: A Tool Toolkit to Support Federal Agencies Implementing BYOD Programs, is applicable to all types of public and private organizations.
The Department of Veterans Affairs will soon solicit bids for a mobile device management system. Get the latest update on how the VA's plan to roll out more than 100,000 devices is evolving.
Information security leaders increasingly take risk concerns to their boards of directors. But do they accurately articulate their messages? Heartland Payment's CSO warns of the most common mistakes.
CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.
In recent weeks, federal officials have added 25 incidents affecting 215,000 individuals to the official tally of major healthcare information breaches. Learn all the latest details in a complete update.
The two final rules for Stage 2 of the HITECH Act's electronic health record incentive program were unveiled Aug. 23. Find out what the rules have to say about encryption.
Targeted phishing attacks are at an all-time high, and one reason for the proliferation is a non-unified response from industry and government, says Peter Cassidy of the Anti-Phishing Working Group.
A former emergency department employee of Florida Hospital Celebration allegedly inappropriately accessed more than 760,000 patient records to find traffic accident victims. Find out the details about his arrest.
Visitors to the sites - applanet.net, appbucket.net and snappzmarket.com - will see a seizure banner that notifies them that the domain name has been seized by federal authorities.
Microsoft's announcement that the next version of its web browser would feature "do not track" by default has revived this privacy debate. How should privacy professionals approach this discussion?
At St. Dominic-Jackson Memorial Hospital in Mississippi, a proactive breach prevention strategy has dramatically reduced privacy violations involving nosy healthcare workers inappropriately accessing medical records.
The University of Texas MD Anderson Cancer Center has reported its second data breach in recent weeks involving an unencrypted mobile device. Find out the details.
A shift to context-aware information security will drive the big data trend and aid in better defending against threats. Gartner analyst Neil MacDonald explains how.
Cloud computing and mobile technologies add new complexities to how we approach identity and access management. RSA CTO Sam Curry offers advice on overcoming the challenges.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.