To help agencies secure their wireless networks and technologies, the Government Accountability Office came up with eight leading practices. For now, GAO says, wireless networks remain at an increased vulnerability to attack.
As healthcare organizations make broader use of wireless networks and devices, they must develop an aggressive risk management plan to address security threats, says security expert Rebecca Herold.
Healthcare organizations need to develop a better understanding of how encryption fits as one of many components in a broad security strategy, says Mac McMillan, CEO at CynergisTek.
Hospitals and clinics that have yet to conduct a risk assessment or create a substantial information security budget should consider the high cost of breaches.
The possibility grows that hackers could take away control of the car from drivers as more automakers provide vehicle-to-vehicle and vehicle-to-infrastructure communications networks to third-party development.
The 2010 HIMSS Security Survey confirms that healthcare organizations are making inadequate progress on ensuring the security of electronic health records and other patient information, says security expert Lisa Gallagher.
American consumers need to know that personal health records must follow government-mandated guidelines for ensuring privacy and security, just as is the case for electronic health records. Otherwise, the use of PHRs may never become widespread.
Although HIPAA requires healthcare organizations to conduct a risk analysis, 14 percent of hospitals and 33 percent of physician group practices have yet to conduct one, a new survey shows.
As hospitals and clinics develop strategies for complying with the privacy and security provisions of the HITECH Act and HIPAA, they must be careful not to overlook the additional risks involved in using wireless technologies.
Could methods employed by the World Health Organization to quarantine people to prevent the spread of deadly diseases be a roadmap on how to prevent virtual viruses from spreading in the cyberworld?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.