Computer scientists at the National Institute of Standards and Technology have released five draft documents on various aspects of information security, and NIST is seeking comments on those drafts.
A recently released presidential council report, while raising important issues, oversimplifies the challenges involved in securely exchanging health information, says Joyce Sensmeier, vice president for informatics at the Healthcare Information and Management Systems Society
The Centers for Medicare and Medicaid Services plans to begin implementing predictive modeling technology nationally this summer to help prevent fraud.
It's not enough to recover data after an incident; also essential is restoring the software needed to read the data, as Federal Emergency Management Agency has learned. The inspector general explains it all.
"We cannot allow security breaches to undermine our trust in the U.S. economy," says Sen. Robert Menendez, the New Jersey Democrat who says he'll introduce the bill. "We must step forward and curb these attacks without delay."
As David Blumenthal, M.D., prepares to step down as National Coordinator for Health Information Technology, it's a good time to assess the privacy and security issues that his successor must address.
Security professionals at organizations adopting cloud computing solutions must put in place policies, processes and relationships that will result in keeping enterprise data safe. This industry perspective recommends:
Adopting high-level information security policies as well as granular procedures and standards...
The successor to David Blumenthal, M.D., who has announced he'll resign as National Coordinator for Health Information Technology this spring, will have a lot of work to do when it comes to protecting the privacy and security of healthcare information.
The Commission on Cybersecurity for the 44th Presidency co-chair praises the president's commitment, but says much more work needs to be done to develop a strategy to combat cyber threats.
Virtually every business acquires, uses and stores personally identifiable information (PII) about its customers, employees and partners. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft. Misusing, losing or...
Federal authorities have created a "Most Wanted Fugitives List" of 10 suspects sought on charges of submitting $124 million worth of fraudulent claims to Medicare and Medicaid.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.