Mobile computing is a powerful, easy-to-use technology that delivers impressive benefits in productivity and agility, that employees are eager to adopt. But along with the impressive benefits come substantial risks, especially related to data security. These risks include new forms of malware that target mobile...
To stay productive, mobile workers want access to the same data they have in the office - including data stored in Enterprise Content Management (ECM) systems such as Microsoft® SharePoint.
When users discover that SharePoint data can't be accessed easily on tablets and smartphones, they often work around...
One of the oft-repeated themes in media reporting of cybersecurity events is that the "threat landscape is constantly evolving," that attacks are becoming increasingly sophisticated and the men and women behind them are better resourced
than ever before. It's certainly true, but begs for a deeper and more nuanced...
Healthcare faces unique IT challenges. While driving down costs and improving the quality and delivery of patient care, providers must comply with a growing number of government mandates and changing industry practices around the privacy and security of PHI. This white paper explains how VMware vCloud® for Healthcare...
From the growth of mobile malware to the refinement of sophisticated banking Trojans and the proliferation of point-of-sale and retail breaches, the fraud landscape continues to evolve for banking institutions globally.
But so, too, do the anti-fraud technology solutions institutions use to detect, prevent and...
Today's spear-phishing attacks are highly targeted, technically sophisticated and represent a real threat to data security. Attackers can leverage information gleaned from social media to tailor messaging to individual targets, and can convincingly imitate legitimate senders.
A successful attack compromises the...
The rise of mobility, BYOD and social networking is increasingly driving cybercriminals to exploit vulnerabilities in browsers and mobile apps. Every day more than 30,000 mostly legitimate websites become infected with malware. From drive-by downloads to spear phishing to XML injection, web-borne threats represent a...
With over 870,000 medical records exposed in data breaches in just the first quarter of 2013, medical data breaches have become a source of chronic pain for healthcare organizations. Adding to this complexity is the HIPAA Omnibus Final Rule.
Looking at a multitude of studies and research, it's clear that data...
New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle a much greater volume and wider scope of data than at present, not to mention provide them with tools to lead them quickly to the most pressing issues. They need threat intelligence...
When it comes to a healthcare breach, there's a lot on the line. The average incident can cost an organization millions during the course of two years and the consumer tens of thousands.
Both the consequences and the risks are high. That's due, in part, to the recent - and sometimes clumsy - adoption of electronic...
The healthcare industry never stands still - new treatments, technological advancements and now the final HIPAA Omnibus Rule are constant reminders of
how the industry is evolving.
The Omnibus Rule is changing patient privacy and data breach response, not only for healthcare organizations but for business...
The Ponemon Institute, sponsored by Experian® Data Breach Resolution, conducted the "Securing Outsourced Consumer Data." The study surveyed over 700 individuals in organizations that transfer or share consumer data with vendors.
Download the "Securing Outsourced Consumer Data" and learn:
The frequency of data...
The second annual Healthcare Information Security Today survey offers an in-depth assessment of efforts to protect patient information. Learn about breach prevention strategies, top security priorities and more.
As major health data breaches continue to grab headlines, and as federal regulators step up enforcement of privacy and security requirements under the new HIPAA Omnibus Rule, healthcare organizations face the challenge of ensuring patient information is adequately protected. What are their key action items? We...
The fact is that the world is constantly evolving and always connected - and your enterprise must be too. Forward-thinking enterprises realize that they need to focus on a sustainable approach to security and risk management - one that is designed to address the new wave of vulnerabilities that prevail due to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.