Virtual Radiologic Professionals, LLC notified individuals about a stolen laptop taken from an employee's car. By corporate policy, the laptop's hard drive was supposed to be encrypted, but something went wrong.
The Department of Health and Human Services says more than 100,000 primary care providers have signed up through regional extension centers to adopt electronic health records. But what does this mean in the EHR big picture?
To win support for information security spending, IT security professionals need to refine how they make their case to senior executives, says Christopher Paidhrin, security compliance officer at PeaceHealth Southwest Medical Center. Here's how.
Most organizations remain uncomfortable in letting their employees use their own mobile devices to access their IT systems. Yet, in many instances, those charged with securing their enterprises' IT understand that it's just a matter of time before they must grant workers permission to employ those devices.
Results from HealthcareInfoSecurity's inaugural survey show regulatory compliance being the No. 1 information security priority for the coming year. What steps should organizations start taking before regulatory audits begin?
Too many of today's firewalls are out of date and opening organizations to unacceptable business risks, says Chris King of Palo Alto Networks.
So, how do we quickly get to the next-generation firewall - and what are the key qualities it will need to embrace?
In an interview about the future of firewalls, King...
Senate Majority Leader Harry Reid, in a letter, informed Minority Leader Mitch McConnell of his decision to bring cybersecurity legislation to the floor during the first work period of 2012 legislative session.
Banks, government agencies and healthcare providers have upped their efforts to assist consumers after an ID theft incident. But much more needs to be done. One ID-theft recovery expert shares her thoughts about areas in need of improvement.
Pennsylvania fined former CISO Robert Maley $10,000 for having vendors pay for his travel, meals and lodging to industry events as well as playoff baseball tickets, violations of a state ethics code, the state Ethics Commission reports.
Sutter Health, an integrated delivery system that was in the process of encrypting all its desktop computers, reports that a device that had not yet been encrypted was recently stolen, affecting more than 4.2 million patients.
The Department of Health and Human Services should provide regularly updated, detailed guidance on all aspects of HIPAA security rule compliance, the Privacy and Security Tiger Team plans to recommend.