Some 1.7 million individuals are being notified of a health information breach incident involving data from The New York City Health and Hospitals Corp. It's the largest breach reported so far under the HITECH Act breach notification rule.
Hussein Syed, director of IT security at Saint Barnabas Healthcare System, explains why the organization shifted from software-based to hardware-based encryption.
It's not enough to recover data after an incident; also essential is restoring the software needed to read the data, as Federal Emergency Management Agency has learned. The inspector general explains it all.
Virtually every business acquires, uses and stores personally identifiable information (PII) about its customers, employees and partners. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft. Misusing, losing or...
The University of Iowa Hospitals and Clinics is firing three employees and giving two others five-day unpaid suspensions because they inappropriately accessed the electronic health records of 13 student-athletes.
A top concern for most financial institutions is how to add new members and strengthen current customer loyalty, especially when faced with competition from larger institutions and behemoths like Walmart. Read about how Altra Credit Union differentiated themselves with exceptional customer value, and increased their...
"Once you get over the idea that we don't have permanent world peace, and people may need to attack each other in particular circumstances ... then maybe there's a lot of good things to say about cyberweapons," says Peter Sommer of the London School of Economics' Information Systems and Innovation Group.
In the second major healthcare hacking attempt reported to federal authorities in recent weeks, a Tampa practice has notified 156,000 individuals that a hacker accessed a server containing its practice management system, which stores patient information.
Those using the federal list of major health information breaches to keep score of how many individuals have been affected must keep in mind that the list is revised as investigations continue.
Implementing electronic health records software that includes security components is just the first of many steps involved in ensuring security, says Bonnie Cassidy, president of the American Health Information Management Association.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.