The rapid growth of telemedicine, especially the use of cell phones for healthcare applications, is raising new security issues, says Jon Linkous, CEO of the American Telemedicine Association.
Utica College in New York now offers unique programs at the bachelor's and master's level that focus exclusively on preparing young adults to take up careers in the emerging areas of cybercrime, cyber intelligence, fraud and forensics investigations.
Health insurer WellPoint Inc. is encouraging its business partners to use the HITRUST Common Security Framework to demonstrate their capabilities for keeping health information secure.
Information on 708 kidney dialysis patients, including their Social Security numbers, was accessible on a University of Louisville web site for more than 19 months as a result of a programming error.
Occupational fraud, mostly through employee theft, is a growing global problem for all public and private sector organizations, according to a new report.
AvMed Health Plans, which earlier reported a breach stemming from the theft of two laptops, now says one of the devices may have included information on more than 1.2 million of its current and former members.
The US Cyber Challenge is looking for 10,000 young Americans with the skills to fill the ranks of cybersecurity practitioners, researchers and warriors.
Think twice the next time a contact tries to "friend" you on Facebook or "follows" you on Twitter. It may turn out to be an undercover fed looking to scrutinize your employment history or examine your personal references.
Reacting to requests from members of Congress, the Federal Trade Commission has yet again delayed enforcement of its Red Flags Rule until Dec. 31, 2010.
The theft of an unencrypted laptop from an employee's car resulted in a breach affecting more than 61,000 patients at Cincinnati Children's Hospital Medical Center.
Building an effective security team boils down to two critical factors: the security leader who understands the mission and has the ability to find and manage the right people with the right skills to execute.
The U.S. Department of Veterans Affairs is defending its security policies following a recent contentious Congressional hearing at which the department was called to task for security lapses.
"Operators of critical infrastructure could opt-in to a government-sponsored security regime," Deputy Secretary William Lynn III says. "Individual users who do not want to enroll could stay in the wild wild West of the unprotected Internet."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.