From Facebook to Twitter, the new era of business communication and collaboration requires involvement of senior leaders to guide an organization's social media strategy and engagement. It's a big role, and it comes with significant responsibilities.
A malicious SQL injection known as Lizamoon could be affecting more than 1 million URLs, according to a blog posting by Patrik Runald, senior manager for security research at Websense, which offers Internet security products and services.
A proposed federal rule that would pave the way for formation of Accountable Care Organizations to coordinate care of chronically ill Medicare patients emphasizes the need to protect the privacy of information shared among ACO participants.
Although many hospitals and clinics are paying attention to HIPAA and HITECH Act compliance, they also need to train their staffs on how to crack down on identity theft and credit card fraud, security specialists say.
Although many organizations are using encryption to protect data on mobile devices, they're often overlooking other important ways to prevent health information breaches, says Terrell Herzig, information security officer at UAB Medicine.
While Japan's nuclear emergency puts local citizens at risk, there is much that organizations globally can learn from the crisis. "I hope that all of us look at this and ask 'What can I do to be better prepared?'" says Regina Phelps, disaster recovery expert.
Enforcing standards for privacy and security is a major part of a new health information exchange accreditation program, says Lee Barrett, executive director of the Electronic Healthcare Network Accreditation Commission.
An Illinois childcare agency has articulated a revised security policy, including the use of encryption, in announcing a breach involving the apparent theft of three back-up unencrypted portable hard drives.
As healthcare organizations digitize more patient information, they need to take five essential risk management steps to ensure that the data is secure and privacy is protected, says Raj Caudhary, a principal at the consulting firm Crowe Horwath.
"We are looking to build a cybersecurity workforce from the ground up, rather than hire those already trained," says Nicole Dean, Deputy Director of the National Cyber Security Division at DHS. "We are looking to hire the best and the brightest."