Federal regulators stirred up controversy when they sent a letter to five healthcare associations warning that the government will prosecute healthcare providers who "game" the system by using EHRs to submit fraudulent bills.
The Department of Veterans Affairs on Sept. 30 will award a contract for an enterprise mobile device management system that will support more than 100,000 devices. Find out how BYOD fits into the VA's plans.
Harvard-affiliated Dana-Farber Cancer Institute researchers are using new technology to securely e-mail sensitive documents to each other and outside collaborators. Find out how the system works.
The CISO of Beth Israel Deaconess Medical Center calls on the Food and Drug Administration to take bold action to help ensure the security of medical devices, which are vulnerable to malware.
Across the board, the job market in the U.S. is extremely competitive. Yet, fraud examiners are in demand -- and there are some tactics you can use to give yourself an edge when seeking a new job.
In the past, just writing "privacy pro" on a business card could get you into the field. "That's not the case today," says the IAPP's Trevor Hughes, who details today's challenges for privacy professionals.
Among Patricia Titus' first priorities as CISO at Symantec: re-focusing the company's security team. One year later, find out how she developed a broader-thinking unit with a new view on security.
Experts analyze a recent decision by federal regulators to back away from issuing voluntary "rules of the road" for secure health information and offer predictions for what happens next.
Thor Ryan, chief security officer at the Alaska Department of Health and Social Services, offers lessons learned as a result of his organization's $1.7 million settlement following a HIPAA compliance investigation triggered by a small breach incident.
A federal agency is offering a free online training program that provides useful insights on protecting information privacy. Learn how this clever training "game" works.
The growth in messaging technologies has fraudsters targeting new channels to attack organizations. Craig Spiezle of the Online Trust Alliance offers tips on how to improve messaging security.
Consumer advocates are praising many of the privacy and security provisions of the final rules for Stage 2 of the HITECH Act EHR incentive program but lamenting some omissions. Find out the details.
"The costly and heavy-handed regulatory approach by the current administration will increase the size and cost of the federal bureaucracy and harm innovation in cybersecurity," states the Republican Party platform.
The final rules for Stage 2 of the HITECH electronic health record incentive program contain multiple provisions regarding privacy and security. Find out what experts have to say about the merits of the new requirements.
Healthcare organizations need to rethink security best practices and tap new technologies as a result of the growth in health information exchange and the use of mobile devices, says researcher Carl Gunter.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.