West Virginia United Health System is taking a multi-step approach to thwarting insider threats, including aggressive analysis of access audits, says assistant CIO Mark Combs, who helps lead the system's privacy and security efforts.
As new cyberthreats emerge, medical device maker Philips Healthcare is implementing a four-prong strategy for ensuring the cybersecurity of its products. Michael McNeil, global product security and services officer, outlines the steps.
What are the top security priorities for healthcare's "CIO of the Year"? Bolstering defenses against phishing, malware and remote attacks head the list, says Sue Schade, CIO at the University of Michigan Hospitals and Health Centers.
Federal regulators plan to release in March a report that proposes a risk-based regulatory framework for health IT. Cybersecurity risks are among those to be addressed.
The Department of Health and Human Services conducts three types of audits or investigations involving privacy and security issues. But preparing for any of these inquiries requires similar steps, experts say.
Consumer advocate Deven McGraw describes how a new federal rule spells out four factors that must be weighed in a risk assessment to determine if a health data breach must be reported.
Implementing a mobile device management system is critical for ensuring the security of patient information. But what questions should organizations ask mobile device management vendors to ensure they pick the right system?
A mobile device management system is critical to any effort to accommodate the use of personally owned mobile devices for work purposes, says Bill Spooner, CIO at Sharp Healthcare.
The Healthcare Information and Management Systems Society Conference, to be held Feb. 20-24 in Las Vegas, will offer a wealth of educational content on privacy and security issues.
To build an effective information security program, organizations and leaders need to take seven essential steps, including updating a risk assessment, says consultant Tom Walsh.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.