Implementing a mobile device management system is critical for ensuring the security of patient information. But what questions should organizations ask mobile device management vendors to ensure they pick the right system?
To protect privacy without adversely affecting the quality of healthcare, hospitals and clinics need to monitor records access and use access controls, a medical informatics expert at Kaiser Permanente says.
Winning CEOs' support for information security investments requires clearly explaining the business impact of inadequate security, says consultant Eric Mueller.
A CEO's experience dealing with the aftermath of an information breach caused by the theft of an unencrypted laptop offers valuable lessons. Read about his real-world advice.
High-profile class action lawsuits filed in the wake of major health information breaches will prove to be a strong catalyst for ramped up data security, a panel of attorneys says.
IT security practitioners who employ the RSA public-private key cryptography needn't lose sleep about its efficacy, despite new research that raises questions on how it creates large prime numbers to generate secret keys, IT security authority Gene Spafford says.
Jason Clark, CSO of Websense, has met recently with 400 CSOs. In a pre-RSA Conference interview, he discusses how security leaders can be more effective when facing mobile security and other challenges.
A California health system is notifying about 30,000 patients that their personal health information was accessible via search engines for about a year.
Getting forensics help should be one of the first steps an organization takes after a breach occurs, says IT security and privacy lawyer Miriam Wugmeister.
To build an effective information security program, healthcare organizations need to take seven essential steps, including updating a risk assessment, says consultant Tom Walsh.
Digital forensics is a growing field with plenty of opportunities for information security pros. Here are the five key steps to take to help ensure a fruitful career.
The recent major breach at Zappos.com should lead security professionals in all industries to carefully review how much client information their organization really needs to store, security expert Fred Cate says.
Healthcare information security thought-leaders offer eight insights on how to prevent breaches, based, in part, on lessons learned from the major incidents reported so far.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.