A lawsuit filed against a former employee at an Atlanta pediatric healthcare system calls attention to the need to detect and mitigate insider threats, including those related to departing workers.
Healthcare organizations aren't performing enough analysis of user behavior to detect possible insider threats, says security consultant Mac McMillan, who outlines the importance of auditing for abnormalities.
The consumerization of IT and the popularity of BYOD are jeopardizing the security and integrity of enterprise data. Seeking an easy way to share files across smart phones, tablets, and desktops, employees are using free public cloud file sharing services that lack rigorous security and audit controls. These services...
The healthcare industry never stands still - new treatments, technological advancements and now the final HIPAA Omnibus Rule are constant reminders of
how the industry is evolving.
The Omnibus Rule is changing patient privacy and data breach response, not only for healthcare organizations but for business...
The cost of a data breach or privacy violation goes far beyond compromised records to include hard-dollar expenditures for breach notification, credit monitoring, regulatory fines and legal fees. Not to mention the immeasurable cost of reputation loss.
To avoid these losses, security leaders are increasingly...
Security threats to healthcare organizations are on the rise - and so are regulatory requirements. Kim Singletary of McAfee discusses the top breach prevention and response challenges for healthcare organizations in 2013.
Healthcare data is generated by numerous systems and in a wide variety of formats. Add to this an ever changing IT vendor technology landscape and it's no surprise that most healthcare applications do not conform to a single data format. With so many unique formats to contend with, managing this data and deriving...
Virtually every business acquires, uses and stores personally identifiable information (PII) about its customers, employees and partners. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft. Misusing, losing or...
Businesses are faced with an assortment of security risks. Among the most prevalent risks are network attacks and infected computing systems (servers and end-user endpoints). The consequences of loss of use - that is, network failures and out-of commission computing systems - are just too great for any business to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.