As healthcare entities embrace consumer wearable health devices, it's critical to carefully weigh patient benefits with the security and privacy risks. Michael Ash, M.D. of Nebraska Medicine, shares advice.
Would encryption, two-factor authentication and other measures stop a determined adversary from stealing millions of U.S. government personnel files? No, a former CIA CISO says. Read how Robert Bigman would defend against OPM-style cyber-attacks.
Following its mega-breach, the U.S. Office of Personnel Management suspends use of its online background check application system, citing a vulnerability. Also, the agency now faces a breach-related lawsuit filed on behalf of federal workers.
With the rise in awareness of visual security threats and the advent in open plan office environments, protecting data inside the organization is a growing concern, says Ben Rooney, a marketing executive at 3M.
Organizations that want to protect sensitive data first need to know where it is. But outside of military and government realms, few employees know how to manually classify data, or have an incentive to do so, says TITUS CTO Stephane Charbonneau.
Just how bad is the U.S. Office of Personnel Management breach? Consider that spies may now have access to every secret - sexual, financial, familial, medical - shared by personnel seeking security clearances to access classified U.S. information.
China is the "leading suspect" behind the OPM breach, says Director of National Intelligence James Clapper, who adds that until the U.S. can meaningfully deter such attacks, it must focus on getting better at defense, not retribution.
Big data analytics may be new to some healthcare organizations, but there are plenty of lessons to be learned from successful deployments. Rick Gamache of Red Sky Alliance shares some of these key lessons.
Recent breaches and regulatory audits have sharpened the focus on third-party risks. How are healthcare entities tackling this critical topic of business associate management? Attorney David Szabo shares insights.
Since 2010, incidents of medical ID theft have nearly doubled, according to research from the Medical Identity Fraud Alliance. MIFA's Ann Patterson tells how healthcare security leaders can reverse this trend.
As threats evolve, healthcare organizations are embracing new solutions to protect health data. But data protection is not enough, says Microsoft's Leslie Sistla. Detection and response strategies are required.
China and the U.S. have agreed to create a new cyber "code of conduct." The move comes in the wake of the U.S. Office of Personnel Management breach, with President Obama urging Chinese officials to help lower cyber-related tensions.