In an age of ubiquitous information sharing, it is critical to control how information is presented - and to whom. Lynne Courts of Seclore discusses new security strategies and solutions that address this need.
As organizations increasingly focus on securing critical data, they mustn't overlook one huge vulnerability: enterprise email. Steven Malone of Mimecast discusses the latest in unified email management.
In a keynote address at the RSA 2014 Conference, Kevin Mandia, founder of Mandiant, warns organizations to beware of "victim's fatigue," or letting your guard down after going six months without a breach.
In the second full day of RSA 2014, ISMG's editors record exclusive video interviews with Troy Leach of the PCI Council, Adam Sedgewick of NIST and Gartner's Avivah Litan. What insights do these thought-leaders share?
While much of the security focus is on online fraud and major data breaches, organizations of all sizes and sectors are seeing a rise in phone-based fraud, says Matt Anthony of Pindrop Security.
The Target retail POS breach is the most talked-about incident in recent memory - and it was entirely preventable with available security solutions, says Adam Tegg CEO of Wontok Solutions.
A lawsuit filed against a former employee at an Atlanta pediatric healthcare system calls attention to the need to detect and mitigate insider threats, including those related to departing workers.
Healthcare organizations aren't performing enough analysis of user behavior to detect possible insider threats, says security consultant Mac McMillan, who outlines the importance of auditing for abnormalities.
The consumerization of IT and the popularity of BYOD are jeopardizing the security and integrity of enterprise data. Seeking an easy way to share files across smart phones, tablets, and desktops, employees are using free public cloud file sharing services that lack rigorous security and audit controls. These services...
The healthcare industry never stands still - new treatments, technological advancements and now the final HIPAA Omnibus Rule are constant reminders of
how the industry is evolving.
The Omnibus Rule is changing patient privacy and data breach response, not only for healthcare organizations but for business...
The cost of a data breach or privacy violation goes far beyond compromised records to include hard-dollar expenditures for breach notification, credit monitoring, regulatory fines and legal fees. Not to mention the immeasurable cost of reputation loss.
To avoid these losses, security leaders are increasingly...
Security threats to healthcare organizations are on the rise - and so are regulatory requirements. Kim Singletary of McAfee discusses the top breach prevention and response challenges for healthcare organizations in 2013.
Healthcare data is generated by numerous systems and in a wide variety of formats. Add to this an ever changing IT vendor technology landscape and it's no surprise that most healthcare applications do not conform to a single data format. With so many unique formats to contend with, managing this data and deriving...
Virtually every business acquires, uses and stores personally identifiable information (PII) about its customers, employees and partners. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft. Misusing, losing or...
Businesses are faced with an assortment of security risks. Among the most prevalent risks are network attacks and infected computing systems (servers and end-user endpoints). The consequences of loss of use - that is, network failures and out-of commission computing systems - are just too great for any business to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.