Addressing Information Security Threats & Challenges in Healthcare

Every healthcare business is vulnerable, and therefore needs an effective means to deal with ever-growing threats and challenges. In an interview with Healthcare Info Security, Lee Kim, the Director of Privacy and Security at HIMSS discussed the issues faced by the healthcare industry and offered insights. “Keeping track of where sensitive data is located, detecting…

Biggest Breach of 2013 Reported in Texas

Protected health information of nearly 277,000 patients at Texas Health Harris Methodist Fort Worth has been compromised after several hospital microfilms, which were supposed to be destroyed, were found in three different public locations. While the patients are being notified about this data breach, it is believed that information including patient names, addresses, dates of…

Vulnerability Management: Secured IT, Assured Success

According to GartnerG2 (now Gartner Industry Advisory Services) a research unit of Gartner, 90% of cyber attacks leverage known security flaws and vulnerabilities, for which patches are already available. Gartner analysts also believe that several security attacks could have been avoided if organizations had focused more on vulnerability management efforts. Effective vulnerability management is therefore…

Common Attack Techniques – In an Era of Industrialized Hacking

Gone are the days when hackers attacked perimeter defences. Today their objective is to take control of confidential data and the applications which process them. Hacking is now an operation involving global coordination, sophisticated techniques and persistent teamwork. And with clear roles and responsibilities being defined in the community, hacking is now a highly organized,…

Implications of the ‘Dodd-Frank Wall Street Reform & Consumer Protection Act’, on Data Security

While the financial services regulatory reform bill signed into law by President Obama last week will take some time to be put into practice, several industry experts have noted that this extensive legislation holds immense significance for information/ data security. Creation of a new consumer protection agency at the Federal Reserve, provision of new powers…