Healthcare organizations need to rethink security best practices and tap new technologies as a result of the growth in health information exchange and the use of mobile devices, says researcher Carl Gunter.
One takeaway from the $1-billion-plus verdict against Android-maker Samsung for infringing Apple patents is that the users of infringed technology also could be held legally liable, patent attorney Jim Denaro says.
As users increasingly use mobile devices and operate outside the traditional corporate network, the concept of "endpoint security" has to evolve. And so do your strategies to secure the endpoint from sophisticated adversaries such as advanced persistent threat.
Register for this webinar to learn more about:
Why...
The Department of Veterans Affairs will soon solicit bids for a mobile device management system. Get the latest update on how the VA's plan to roll out more than 100,000 devices is evolving.
E-mail, IM, text messaging - we all increasingly depend on messaging technologies. And so do the fraudsters. Craig Spiezle of the Online Trust Alliance discusses how to mitigate our vulnerabilities.
The two final rules for Stage 2 of the HITECH Act electronic health record incentive program don't include firm data encryption mandates. But they come very close, indeed. And that's an important step forward.
CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.
Ron Ross, the NIST IT security and risk guru, sees cloud computing as a vehicle to help organizations implement an information risk management framework.
The two final rules for Stage 2 of the HITECH Act's electronic health record incentive program were unveiled Aug. 23. Find out what the rules have to say about encryption.
End users are demanding their own devices in the workplace making IT the shepherds of a potentially unruly flock. The good news is IT can embrace BYOD with security and confidence given the right preparation and technology Whether you're supporting iOS, Android, BlackBerry or Windows, the rules of BYOD don't change....
Most businesses are confronting how to fully embrace mobile devices beyond their executive and sales teams. Users are choosing the Android and iPhone experience over the largely business-task-driven BlackBerry devices. They have also adopted application stores in their personal lives, blending activities like web...
Managing smartphones and tablets is only half the MDM story. Securing the data and access points between corporate systems and your workers' iOS, Android, Windows, and BlackBerry devices requires just as much consideration and planning as protecting the devices themselves.
This white paper highlights:
10 Policy...
Close your organization's doors to malware.
Installing and using effective anti-malware solutions in systems and devices that contain or have access to sensitive information is important. Just as you would never leave your house's doors open at night or when you're not at home, your company's doors should never be...
Targeted phishing attacks are at an all-time high, and one reason for the proliferation is a non-unified response from industry and government, says Peter Cassidy of the Anti-Phishing Working Group.
Visitors to the sites - applanet.net, appbucket.net and snappzmarket.com - will see a seizure banner that notifies them that the domain name has been seized by federal authorities.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.