To access a central data repository in the cloud, participants in a Chicago health information exchange now in development will use a virtual private network where all data traffic is encrypted, says Terri Jacobsen, director of the project.
The arrest followed an investigation into network intrusions and distributed denial of service attacks against a number of international business and intelligence agencies by what is believed to be the same hacking group.
As the Sony and Epsilon breaches show, privacy is now in the news media every day. And organizations need to be prepared to address the issue, says Trevor Hughes, executive director of the International Association of Privacy Professionals.
The Privacy and Security Tiger Team is recommending that electronic health records software certified for the HITECH Act's EHR incentive program should be able to record corrections from patients or providers as well as transmit those corrections to others.
It's not easy to read into LulzSec's motivation. They seem intolerant of those who know the rules but fail to follow them, such as IT security professionals who reuse passwords. They're brazen, and they're in it for the laughs.
A nurse who formerly worked at several Denver-area hospitals has been arrested on 90 felony charges of identity theft and theft of medical records, the Adams County District Attorney's office confirms.
Organizations are starting to adapt to cloud computing, but they're hesitant about placing their core assets in the online environment, according to results from the 2011 ISACA IT Risk/Reward Barometer.
Kundra joined the Obama administration in March 2009 as administrator for e-government and IT at OMB and given the additional title of chief information officer, the first person to officially hold that post.
"While securing energy, financial, health and other resources remain vital, the future of the innovation and the economy will depend on the success of Internet companies and ensuring that these companies are trusted and secure is essential," Commerce Secretary Gary Locke says.
Adam Greene, the primary author of the proposed accounting of disclosures rule mandated under the HITECH Act, says healthcare organizations preparing to comply should make sure their audit logs are functioning well.
Recent hacks have uncovered security vulnerabilities that should have been addressed years ago. "These attacks are going to escalate," says Josh Corman of The 451 Group. But organizations can implement basic steps to make the hackers' job harder.
An unencrypted laptop computer that's missing from the United Kingdom's National Health Service North Central London health authority contained information on 8.63 million people, according to a report on The Sun newspaper's website.