Privacy & Security
10:03 am July 29, 2015
Ponemon's recently published 2015 Study on Privacy & Data Security of Healthcare Data makes one point crystal clear: healthcare organizations must do more to protect sensitive patient information from the wide variety of data breach threats.
09:06 am July 14, 2015
The massive data breach at the Office of Personnel Management has already brought down director Katherine Archuleta and launched a class-action lawsuit by the American Federation of Government Employees. It didn't have to happen.
08:53 am July 08, 2015
Millions of Americans now victims of medical identity theft. Who are the criminals behind this digital era crime wave? A foray into the online black market for stolen data is a surreal experience.
10:28 am July 07, 2015
Many organizations do a decent job of limiting access to data and systems for their general user population. When it comes to privileged access, however, most simply attempt to limit who has this type of access without considering some inherent risks.
10:16 am June 26, 2015
The equipment used in hospitals is often not user-serviceable and therefore often running out-of-date software or firmware. This creates a dangerous situation where devices have vulnerabilities that can be easily exploited by bad actors.
10:44 am June 25, 2015
To reduce opportunities for hackers to succeed, healthcare entities must be proactive about protecting sensitive data across their organization. Security must be an ongoing practice and a top priority.
08:48 am June 25, 2015
Fifty states plus the feds makes 51 sets of privacy rules many healthcare organizations have to take into account as they manage their digital information.
11:10 am June 23, 2015
Everyone involved in healthcare needs to know their responsibilities with regard to privacy and security, because everyone is potentially held accountable by customers, regulators, the courts and their business partners.
09:12 am June 10, 2015
Securing patient data starts with encryption, but equally important is the use of strong identity authentication. Authentication guarantees that the sender and recipient of healthcare data are, in fact, who they claim to be.
10:16 am June 08, 2015
What used to be viewed as an operational issue is now a trustee responsibility because of the likelihood of lawsuits following a data breach. Boards across the U.S. want to avoid the headaches recently experienced by other organizations.