HealthcareInfoSecurity has launched its inaugural Healthcare Information Security Today survey gauging top trends, threats and priorities for hospitals, clinics, health plans and integrated delivery systems.
"Consumer notification is often hampered by the fact that companies must first determine their obligations under 47 different state regimes," says Rep. Mary Bono Mack, R-Calif., the subcommittee's chair and bill's sponsor.
If enacted,the bill that's heading to the House floor would require increased coordination and prioritization of federal cybersecurity R&D activities and the development of cybersecurity technical standards. It also would strengthen cybersecurity education and talent development and promote industry partnership...
It's not enough for banking institutions to conform to the FFIEC Authentication Guidance update. They also must ensure that their key vendors meet the same standards, says Philip Alexander of Wells Fargo Bank.
NIST's Ron Ross points out that its seminal security control guidance, Special Publication 800-53, contains only one privacy control, requiring agencies to conduct a privacy impact assessment. That will change by year's end.
A new consumer survey suggests healthcare organizations still have a long way to go in educating patients about the benefits of electronic health records and easing their concerns about security issues.
The U.S. government wants to move many services online, but the inability to authenticate customers and develop Trusted Identities has kept agencies from making the transition. This is a problem that could soon be resolved, says Mike Ozburn, principal of Booz Allen Hamilton.
"These are projects that were already...
Former banking regulator William Henley has simple advice for banking institutions wondering how to comply with the new FFIEC authentication guidance update: "Start immediately, develop a plan, and document your progress."
Beth Israel Deaconess Medical Center in Boston is notifying more than 2,000 of its patients about an unusual potential health information breach incident involving a computer virus that transmitted data to an unknown location.