In the on-prem world, companies needed experts for each major area of IT provenance: hardware, networking, systems administration, security, operating systems, virtualization, workload balancing, data integration, data cleansing and quality, and then all the function-specific applications that drive everyday business...
The $940 billion compensation awarded to Epic Systems in its case against Indian IT major TCS is unprecedented - shaking the industry out of its complacency to information security. Cyber law expert "Naavi" takes a close look at the implications for India.
Achieving HIPAA compliance is a journey, not a destination. The regulatory landscape is constantly changing, resources are stretched beyond capacity, disparate systems make it difficult to assess and remediate gaps, and the sophistication of cybercriminals is accelerating faster than most healthcare organizations can...
MedStar is but the latest healthcare entity to fall victim to a ransomware attack. What can organizations do proactively to improve their ransomware defenses and response? PhishMe CEO Rohyt Belani offers insight.
It's no surprise that healthcare entities are being targeted, Belani says - and not just by ransomware,...
Healthcare organizations face an ongoing compliance burden involving the protection
of sensitive patient data. The task of safeguarding data grows increasingly complex as
the organization's environment adapts to advancing threats and shifting technology
trends. Once simply in record rooms and on desktops, now...
Securing sensitive emails isn't just a best practice - it's often the law. Compliance with
regulations is a priority for healthcare, financial services and government organizations; it may
also need to be a priority for companies that work with these organizations or practice business
in specific...
LabMD's recent victory in its long legal battle with the Federal Trade Commission will be short-lived, the medical testing lab's CEO predicts. Find out why, and what changes Michael Daugherty hopes the case will bring to FTC's enforcement practices.
What are the biggest cyberthreats facing healthcare entities today and on the horizon? What steps are healthcare organizations taking to prevent and detect breaches? And what are the top data security priorities for the year ahead?
For answers to these questions and many more, check out the Healthcare Information...
Information security and privacy work in healthcare environments often requires a depth of specialized knowledge and competency that can be validated through the help of professional credentialing, says CISO Sean Murphy.
Covered entities and business associates will be under heightened data privacy and security scrutiny in 2014. But experts say there are several basic steps those organizations can take to ensure HIPAA compliance.
New payment card security standards issued by the PCI Council include a number of improvements, plus some glaring omissions, such as requirements for mobile, security experts say. What are their chief concerns?
Consumer advocate Deven McGraw describes how a new federal rule spells out four factors that must be weighed in a risk assessment to determine if a health data breach must be reported.
The HIPAA Omnibus Rule stresses the need for business associates to adequately safeguard patient information. What are the implications? Here's what a federal privacy officer and a consumer advocate have to say.
How is the six-hospital Barnabas Health delivery system tackling the challenge of complying with the new HIPAA Omnibus rule? Hussein Syed, director of IT security, explains.
Security threats to healthcare organizations are on the rise - and so are regulatory requirements. Kim Singletary of McAfee discusses the top breach prevention and response challenges for healthcare organizations in 2013.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.