It's not enough to recover data after an incident; also essential is restoring the software needed to read the data, as Federal Emergency Management Agency has learned. The inspector general explains it all.
Virtually every business acquires, uses and stores personally identifiable information (PII) about its customers, employees and partners. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft. Misusing, losing or...
The University of Iowa Hospitals and Clinics is firing three employees and giving two others five-day unpaid suspensions because they inappropriately accessed the electronic health records of 13 student-athletes.
A top concern for most financial institutions is how to add new members and strengthen current customer loyalty, especially when faced with competition from larger institutions and behemoths like Walmart. Read about how Altra Credit Union differentiated themselves with exceptional customer value, and increased their...
"Once you get over the idea that we don't have permanent world peace, and people may need to attack each other in particular circumstances ... then maybe there's a lot of good things to say about cyberweapons," says Peter Sommer of the London School of Economics' Information Systems and Innovation Group.
In the second major healthcare hacking attempt reported to federal authorities in recent weeks, a Tampa practice has notified 156,000 individuals that a hacker accessed a server containing its practice management system, which stores patient information.
Implementing electronic health records software that includes security components is just the first of many steps involved in ensuring security, says Bonnie Cassidy, president of the American Health Information Management Association.