Privacy advocate Deborah Peel, M.D., is worried that several ongoing healthcare sector initiatives could potentially erode patient privacy and individuals' control over their health records. Find out about her latest concerns.
Last year, several high profile security incidents occurred at healthcare organizations where a HIPAA Risk Assessment (HSRA) had previously been conducted. This should provoke some pointed questions: Was the HSRA comprehensive enough? Was the remediation plan implemented correctly and in a timely manner? Was an...
As healthcare organizations step up their efforts this year to exchange more patient data with others to improve care, it's urgent that they address the "significant risks" involved, says Erik Devine, chief security officer at an Illinois hospital.
The secure national exchange of patients' health information for use in treatment will make progress once "we simplify what we say when we're explaining privacy to people," says Lucia Savage, new chief privacy officer of ONC.
In November and December of 2013, Cybercriminals successfully collected, staged and ultimately exfiltrated "Track 1 and 2" data related to millions of debit and credit cards. While many details remain unclear, quite a few have emerged. There has been a lot of speculation about what security products Target Corporation...
For many organizations, unsecured email represents the most prolific source of threats to the enterprise. And as the gateway for phishing and targeted attacks, these attacks can also be some of the most dangerous.
Email encryption can reduce or remove much of the risk associated with email - but the barrier for...
Office 365 represents Microsoft's newest foray (in quite a long line of them) into the cloud-based email and collaboration space. Yet many- if not most- Office 365 customers have found themselves requiring more granular capabilities than are available on the platform.
Read this white paper to learn...
Social media is fast, ubiquitous, and in many cases produces measurable ROI to a business; however, it also poses significant risks that can become public and propagate virally.
This whitepaper defines a clear road map for social media compliance. Learn how to:
Meet regulatory compliance standards regarding social...
The unrestrained growth of digital information world-wide is making it extremely difficult for organizations to capture, manage, store, share and dispose of information in any meaningful way. With the challenges of an evolving regulatory environment and the information overload problem with management practices, many...
Hardly a day goes by without the discovery of a new cyber threat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?
Thankfully, Kaspersky Lab security experts have got you covered. Download our Guide to the Threat Landscape to have access to a wealth of IT security...
Complexity is to cybersecurity what kryptonite is to Superman. Even if you have adequate antivirus protection, are there still holes in your IT security armor? Is lack of bandwidth to manage the growing list of threats, endpoints, and security systems making your organization vulnerable?
This white paper provides...
Mobile computing is ubiquitous, but security solutions for mobile workers are not. For mobile security to be effective, tools and policies often need to be customized for specific users, roles, departments; or technologies. Rather than investing in solutions and enforcing security policies that treat all mobile users...
The typical mobile worker is carrying three or more mobile devices, at least one of which is a personal device brought from home. Organizations need to protect their data on every mobile device it resides. Unfortunately, enterprise mobile security falls short much of the time.
Download this white paper to...
In an exclusive interview, Kevin Charest, CISO of the Department of Health and Human Services, discusses recent healthcare sector cybersecurity drills, as well as an update of HealthCare.gov security.
Information security and privacy work in healthcare environments often requires a depth of specialized knowledge and competency that can be validated through the help of professional credentialing, says CISO Sean Murphy.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.