A coalition of 21 private insurers, government agencies and others is working together to tackle healthcare fraud. What's the group's strategy? WellPoint's Lee Arian explains.
What's the best way to prepare to comply with HITECH Stage 2 privacy and security requirements? Federal privacy officer Joy Pritts advises healthcare organizations to start by conducting a thorough risk assessment.
While the Office of the National Coordinator for Health IT continues work on mobile device security guidance for smaller healthcare organizations, a researcher offers insights on steps these providers can take now to improve security.
The final rules for Stage 2 of the HITECH electronic health record incentive program contain multiple provisions regarding privacy and security. Find out what experts have to say about the merits of the new requirements.
Learn why the CEO of HealthInfoNet, Maine's statewide health information exchange, is a strong advocate of the centralized data architecture model to help standardize security controls.
Healthcare organizations need to rethink security best practices and tap new technologies as a result of the growth in health information exchange and the use of mobile devices, says researcher Carl Gunter.
One takeaway from the $1-billion-plus verdict against Android-maker Samsung for infringing Apple patents is that the users of infringed technology also could be held legally liable, patent attorney Jim Denaro says.
As users increasingly use mobile devices and operate outside the traditional corporate network, the concept of "endpoint security" has to evolve. And so do your strategies to secure the endpoint from sophisticated adversaries such as advanced persistent threat.
Register for this webinar to learn more about:
Why...
The Department of Veterans Affairs will soon solicit bids for a mobile device management system. Get the latest update on how the VA's plan to roll out more than 100,000 devices is evolving.
E-mail, IM, text messaging - we all increasingly depend on messaging technologies. And so do the fraudsters. Craig Spiezle of the Online Trust Alliance discusses how to mitigate our vulnerabilities.
The two final rules for Stage 2 of the HITECH Act electronic health record incentive program don't include firm data encryption mandates. But they come very close, indeed. And that's an important step forward.
CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.
Ron Ross, the NIST IT security and risk guru, sees cloud computing as a vehicle to help organizations implement an information risk management framework.
The two final rules for Stage 2 of the HITECH Act's electronic health record incentive program were unveiled Aug. 23. Find out what the rules have to say about encryption.
End users are demanding their own devices in the workplace making IT the shepherds of a potentially unruly flock. The good news is IT can embrace BYOD with security and confidence given the right preparation and technology Whether you're supporting iOS, Android, BlackBerry or Windows, the rules of BYOD don't change....
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.