The ECRI Institute recently published a report on controlling the risks involved in using social media in healthcare. Read on to discover insights on how to address risks and prevent breaches.
Although the Obama administration's recently announced Consumer Privacy Bill of Rights shouldn't be seen as the "be-all, end-all," says privacy and data security lawyer Lisa Sotto, they are an important step forward in getting industries and leaders to start thinking about privacy more seriously.
Many healthcare organizations are ramping up their use of mobile devices before they have appropriate privacy and security policies, procedures and technologies in place, some experts say.
Hacking is behind most large-scale data breaches. What steps can organizations and leaders take to safeguard their information post-attack? Karen Barney of the Identity Theft Resource Center offers advice.
NIST's latest guidance adds controls that reflect the rapidly changing computing environment, but the fundamentals of implementing controls haven't changed, Senior Fellow Ross says in a video interview.
Consumer advocate Deven McGraw describes what she likes and doesn't like about the privacy and security provisions in the proposed rules for Stage 2 of the HITECH Act electronic health record incentive program.
The privacy profession is evolving, says Kirk Herath, Chief Privacy Officer of Nationwide Insurance. For those who are new to the role, Herath offers three pieces of advice.
The Obama administration's Consumer Privacy Bill of Rights should be seen as a vital document to help shape an expansive and globally accepted privacy framework in the United States, privacy and data security lawyer Lisa Sotto says.
Data breaches tied to credit and debit cards accounted for more than 25% of all breaches in 2011. What must banking institutions and merchants do to help reverse this trend?
IT security practitioners who employ the RSA public-private key cryptography needn't lose sleep about its efficacy, despite new research that raises questions on how it creates large prime numbers to generate secret keys, IT security authority Gene Spafford says.
NIST's Ron Ross will be quite busy at RSA Conference 2012, not only promoting revised guidance on security and privacy controls to be unveiled at the securing conclave, but also participating in a panel on one of his favorite topics: continuous monitoring.
From smart phones to tablets, laptops to USB devices, consumer technologies are ubiquitous in the workplace - and so is the 'bring-your-own-device' (BYOD) practice of allowing employees to conduct work on their own personal electronics.
But how do these consumer technologies change organizations' approaches to...
Bank of America blames a suspected breach of credit card data on an unidentified third party. What happened, and what can other institutions do to better protect themselves and their customers?
When Google amended its policy, suddenly everyone was talking about privacy. How do privacy officers turn these discussions to their advantage? Kirk Herath of Nationwide Insurance has some ideas.
In the wake of the latest hacktivist attacks against high-profile institutions, industry experts offer these tips to bolster online security, customer awareness and the corporate image.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.