Social media, mobility and cloud computing are new areas of risk for organizations, and risk managers need to go back to the fundamentals of understanding the information they are protecting, says Robert Stroud, ISACA's international vice president.
A Georgia hospital has informed 7,500 patients that they may have been affected by a breach incident involving the theft of personal information that could have been used to commit federal income tax fraud.
The Department of Veterans Affairs is offering a $50,000 prize to a developer who successfully demonstrates the expansion of the use of the "Blue Button" application to enable veterans to download their patient information from providers outside the VA.
The Department of Health and Human Services has published a proposed rule that describes privacy, security and many other standards for web-based state insurance exchanges called for under the healthcare reform law.
More organizations that run health information exchanges are offering patients the opportunity to provide more specific levels of consent for the exchange of their records, a new survey by the advocacy group eHealth Initiative shows.
In one of the largest health information breaches reported so far this year, Spartanburg Regional Healthcare System in South Carolina has notified 400,000 of an incident involving the theft of a desktop computer from an employee's car.
The Government Accountability Office has issued a report chastising the Centers for Medicare and Medicaid Services for delays in fully implementing its Integrated Data Repository used to crack down on fraud.
"Our role is changing in the fact that we see fraud being perpetrated in a new manner everyday via malicious software, banking Trojans and online theft," says Jean-FranÃ§ois Legault, senior manager of forensics and dispute services at Deloitte.
Fraud today is global. The same problems happening in the U.S. are simultaneously occurring in other parts of the world. For interested job seekers, there's never been a better time to enter the fraud examiner profession.
The Health IT Policy Committee has accepted recommendations that electronic health records software certified for future stages of the HITECH Act's EHR incentive program should be able to record corrections from patients or providers as well as transmit those corrections to others.
Many implantable medical devices have wireless connections that enable physicians to monitor patients. But with that wireless connectivity comes the risk of a hacker attack with potentially life-threatening results.
Among the 12 computer-related job classifications tracked by the Department of Labor's Bureau of Labor Statistics, information security analysts was one of only two categories to report no unemployment during the second quarter of 2011.