An analysis of the privacy issues Amazon will face as it dives deeper into the healthcare business leads the latest edition of the ISMG Security Report. Also featured: A preview of ISMG's Security Summit in New York Aug. 14-15.
Documents containing information on more than 300,000 patients were recently discovered on the former campus of a Missouri hospital that's being prepared for demolition four years after the hospital moved to new facilities. The incident illustrates the need to track all paper records that contain PHI.
More than a dozen technology and medical organizations are asking HHS why it's taking so long to issue regulations aimed at limiting the blocking of health information sharing. The regs were called for in a law passed in 2016.
As Amazon expands its activities in healthcare, include a high-profile venture into the pharmacy business, the online retail giant will face a wide variety of important privacy issues, attorneys Jeffrey Short and Todd Nova explain.
One measure of why it's so difficult for organizations to keep their software patched and better secured: Of the nearly 20,000 unique vulnerabilities in 2,000 products cataloged last year, only half involved Microsoft, Adobe, Java, Chrome or Firefox software, says Flexera's Alejandro Lavie.
Are federal regulators beginning to slack off on HIPAA compliance enforcement? While some observers say the lack of recent settlement announcements could signal the start of a lasting trend, others contend that HHS remains committed to aggressive HIPAA enforcement.
HHS is considering making changes to federal privacy regulations governing health data - including HIPAA and the 42 CFR Part 2 law. While regulatory experts are already debating whether changes to HIPAA are, indeed, needed, many say changes to the 42 CFR Part 2 are long overdue.
With the cybersecurity threat landscape growing and evolving
rapidly, many enterprises and other large organizations are
seeking more effective ways to protect themselves and their
employees from these threats.
One of the most effective strategies for doing this is to take a more
dynamic and proactive approach to...
Whether you've visited the Dark Web or not, you're likely aware that
it's comprised of various anonymous forums and black markets.
Many of these Dark Web black markets are used for illegal activities,
like buying and selling drugs, weapons, confidential documents
and illegal services. While you may not be in the...
When it comes to the internet of things, balancing the need to protect privacy against the need for technological innovation, such as to improve healthcare, is proving challenging, says attorney Jean Marie Pechette.
Security leaders have been addressing the global skills gap for over a decade, with little to show for it.
However, a new approach - leveraging software as a service - is making up for the staffing shortfall.
The discussion really starts with software as a service. If you look at the benefits of leveraging the cloud...
Facebook is making substantial investments to improve its data security and privacy practices. But the long-term cost of those investments and impact on the bottom line has spooked investors, leading to a $120 billion loss in market value on Thursday, the largest one-day loss of value for a U.S. traded company.
There's no question that the threat landscape is constantly shifting for financial services companies. Throughout 2017 and the first half of 2018, we've seen a continued increase in attacks that directly target financial
organizations, which comes as no surprise. However, increased access to user and account data has...
In our modern age of digital connections and ubiquitous Internet access, both organizations and individuals face a "double-edged sword" when using web-based technologies. As we've increased our usage of the World Wide Web, our digital footprints have grown exponentially, and as a result, so has the digital attack...