What are the top security priorities for healthcare's "CIO of the Year"? Bolstering defenses against phishing, malware and remote attacks head the list, says Sue Schade, CIO at the University of Michigan Hospitals and Health Centers.
Improving the security of medical devices requires the collaboration of healthcare organizations, manufacturers, regulators and patients, says researcher Ryan Kastner, who outlines action items.
Consumer advocate Deven McGraw describes how a new federal rule spells out four factors that must be weighed in a risk assessment to determine if a health data breach must be reported.
As a result of the HIPAA Omnibus Rule, which broadens the number of organizations that must meet privacy and security requirements, demand for infosec pros in healthcare is higher than ever. Where is the greatest need?
What's the best way to win a CEO's support for greater information security investments? Consultant Eric Mueller advises IT security professionals to spell out the business impact of inadequate security.
Attorney Adam Greene and security specialist Mac McMillan review lessons learned from major healthcare information breaches and provide insights on breach prevention.
Clever motivational techniques can play an important role in making sure patient privacy is protected and in creating a corporate culture that values security.
Winning CEOs' support for information security investments requires clearly explaining the business impact of inadequate security, says consultant Eric Mueller.
Healthcare organizations need to make sure they don't overlook certain key risk management and security steps. Learn from industry experts exactly what those key measures are.
The Healthcare Information and Management Systems Society Conference, to be held Feb. 20-24 in Las Vegas, will offer a wealth of educational content on privacy and security issues.
To build an effective information security program, organizations and leaders need to take seven essential steps, including updating a risk assessment, says consultant Tom Walsh.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.