An audit has determined that 10 to 20 percent of the Department of Veterans Affairs' vendor contracts lack information security clauses, VA CIO Roger Baker says.
The Federal Aviation Administration is inadequately securing medical and personal information on the more than 3 million airmen who it certifies as being fit to operate an aircraft, according to a new report.
Businesses are faced with an assortment of security risks. Among the most prevalent risks are network attacks and infected computing systems (servers and end-user endpoints). The consequences of loss of use - that is, network failures and out-of commission computing systems - are just too great for any business to...
Faced with a batch of bad publicity about healthcare information security, the Department of Veterans Affairs has launched an effort to help polish its image.
A new federal healthcare task force on privacy and security, which will hold its first meetings June 10 and 11, will initially focus on policies and standards for the exchange of health information.
A California hospital will fire five employees and discipline another because they used social media to post personal discussions about hospital patients.
The theft of an unencrypted laptop from an employee's car resulted in a breach affecting more than 61,000 patients at Cincinnati Children's Hospital Medical Center.
A North Carolina urgent care center has paid a $50,000 settlement because its patient information was disposed of in a dumpster last year in violation of state law.
A Congressman is citing the recent theft of an unencrypted laptop containing health information on 616 veterans as evidence that the Department of Veterans Affairs is not doing enough to protect information.
A New York managed care plan has learned an important lesson about leased copy machines: Many contain hard drives that should be scrubbed of information before the copiers are returned.
The federal government is seeking a contractor to help assess healthcare cybersecurity risks in the public and private sectors.
The contractor also will create and test risk mitigation strategies. The results of the project will help support development of federal policies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.