When a healthcare system wanted to ensure HIPAA/EDI compliance, they undertook a risk assessment to better understand their security posture. They uncovered sensitive data being sent out over the internet instead of through a secure channel which had been set up.
Download this case study and learn how SCHS was able...
Healthcare is the only industry where employees are the primary reason for a data breach. A variety of motives including monetary gain, negligence or the need to access patient data quickly lead to Patient Health Information (PHI) loss.
Download this whitepaper and learn:
Real world scenarios that put PHI data at...
Complicating healthcare compliance efforts is the growing trend of migrating patient data to cloud storage and hosted applications such as Health Information Exchange systems. The cloud lowers costs and improves efficiency, but widens the attack surface for data breaches.
To counter this challenge, download this...
Despite all the talk of the "death of the password," we don't yet live in a post-password world. With dozens of different accounts, emails, and databases that we have to access, there are a myriad of passwords to remember. As a result, the security of businesses suffers from inaccurate password tracking, lack of...
Traditional identity and access management (IAM) controls, though extensive, are static. Once a malicious user gains access, they are free to exploit the system up to the extent of the account's set privileges.
Download this whitepaper and learn how an identity-centric approach to security solves this problem...
This IDC Executive Brief provides a short introduction to the main characteristics of GDPR, and proposes a number of technologies that companies should consider in their compliance activities. It concludes with several action points that provide guidance on essential elements of a compliance program.
Download this...
As the GDPR's enforcement date nears, North American healthcare organizations are scrambling to ensure their data protection policies and practices are up to snuff. Mitch Parker of Indiana University Health System offers his prescription for GDPR compliance.
Dozens of lively discussions sprung up among the healthcare CISOs, legal experts and leaders from government agencies and technology vendors at Information Security Media Group's Healthcare Security Summit in New York. So what are some of the key takeaways?
With the aim of protecting data privacy, the government of Singapore is considering taking steps to greatly reduce the use of the National Registration Identity Card numbers for verifying consumers' identities.
A report on the head of Equifax contending that his company - not individual consumers - owns the personally identifiable information the credit reporting agency markets to lenders leads the latest version of the ISMG Security Report. Also, a preview of the ISMG Healthcare Security Summit.
CISO Mitchell Parker of Indiana University Health says healthcare organizations that have focused on HIPAA compliance when crafting security and privacy policies need to be making plans to comply with the EU's GDPR if they handle Europeans' data. How will that influence decisions about data protection?
The latest ISMG Security Report features highlights from the recent panel discussion at the ISMG Fraud and Breach Prevention Summit in London on preparation for the European Union's General Data Protection Regulation set to be enforced next May.
Longtime privacy advocate Deven McGraw has left her positions leading health information privacy efforts at the Department of Health and Human Services. What's next for privacy leadership at HHS?
Security probes into IoT vulnerabilities too often swerve into creepy territory. Take security researchers at Check Point who discovered they could seize control of an internet-connected LG vacuum cleaner's camera, allowing them to turn a roving robotic cleaner into a spy cam.
Medical device cybersecurity scrutiny usually focuses on potential patient safety issues. But vulnerabilities identified in a cardiac pacemaker programming device illustrate the risks also posed to patient data privacy, says Billy Rios, a researcher who discovered the problem.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.