privacy and security
See the following -
2014 Was Landmark Year For Health Data Breaches
When it comes to health data breaches, 2014 was a milestone year. Healthcare organizations accounted for about 42 percent of all major data breaches reported this year, according to the Identity Theft Resource Center...
- Login to post comments
5 "Crazy Ones' Reshaping Health IT
...With a nod to Apple and its famous 1997 TV spot, which highlighted doers and dreamers in all fields of endeavor who colored outside the lines, we put the spotlight on just five of the many 'crazy ones' who are helping transform health IT in new and unique ways...
- Login to post comments
5 Best Open Source Web Browser Security Apps
The Web browser acts as the gateway for myriad online services these days. Computer security problems are far from solved, and technology advances provide new ways for malware to infect our devices and enter our business networks...
- Login to post comments
Are Your Medical Records Open To Theft?
A major criticism of EMRs is the companies that make them have financial incentives to keep them from being easily shared...
- Login to post comments
CommonWell: Healthcare Interoperability Or Bust
Peter Bernhardt of CommonWell Health Alliance, a group of clinical and health IT organizations, talks about its goal of better data exchange and application integration...
- Login to post comments
Hackers Exploit Heartbleed To Swipe Data Of 4.5 Million
In the second biggest HIPAA breach ever reported, one of the nation's largest healthcare systems has notified some 4.5 million of its patients that their personal information has been snatched by cybercriminals...
- Login to post comments
Is Healthcare Ready For Cyber Attacks?
A cyber threat response drill for healthcare organizations conducted this past month highlighted some serious challenges facing healthcare security professionals.
- Login to post comments
Just Touching A Laptop Can Reveal Secret Data
It's the most "current" news you'll read all day: The pattern of the electric currents that pass through your laptop computer can be used to determine your encryption keys, as a group of three Israeli researchers at Tel Aviv University have shown...
- Login to post comments
Linux Foundation Expands Management Team To Respond To Growth
IoT, Finance, Communications and Technical Talent Added to Manage Demand for Open Source Software...
- Login to post comments
Mobile Devices, Apps Open For Attacks
In many ways, mobile device security is an oxymoron in its current state. In fact, if you're using an Internet of Things-type device, chances are it has an average of 25 hidden vulnerabilities, according to new research, making it a ripe target for hackers...
- Login to post comments
Netflix Vs. Healthcare.Gov
What could possibly have motivated the Centers for Medicare and Medicaid Services to refuse to release even a single document about the healthcare.gov site’s security in response to a Freedom of Information Act request submitted by the Associated Press? The AP announced that its request had been refused last week and, by way of explanation, cited a statement from CMS spokesman Aaron Albright that “releasing this information would potentially cause an unwarranted risk to consumers’ private information.”...
- Login to post comments
Q&A: The Philosophical Shift True Security Requires
...[Cris] Ewell spoke with Executive Editor Tom Sullivan about AOB, what he considers the three types of adversaries to guard against, and the need for balancing both risk and federal regulations...
- Login to post comments
Security: Healthcare's Fixer-Upper
The alarming state of affairs, how the industry's slack security is bad for business and what some are doing to step it up...
- Login to post comments
The CISPA-Zombie Won’t Die. Instead, It Changed Its Name To CISA And It’s Here To Violate Your Privacy.
On Tuesday, the Senate Intelligence Committee met in secret and approved the Cybersecurity Information Sharing Act of 2014 (CISA)(S. 2588). The bill started out in bad shape, and privacy advocates across the country spoke out about our concerns...
- Login to post comments
The Words Healthcare CIOs Don't Want To Hear
No matter what your job, there are certain phrases – whether said by bosses, colleagues or clients – that are just plain unwelcome: words that foretell frustration and added workload at best, panic and red-alert crisis response at worst.
- Login to post comments