Sinopsis
Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Case Study: A Health Record Bank Pilot
09/11/2010The health record bank model offers a good method for patients to control who can access their records, says Jesus Hernandez, who's leading an effort to test the model.
-
Addressing Public Wi-Fi Security Risks
08/11/2010Healthcare organizations offering free Wi-Fi service to patients and guests need to take multiple security steps, says security expert Christopher Paidhrin
-
Incident Response Career Trends
05/11/2010Information security incidents are more sophisticated - and so are the criminals who perpetrate them. This raises the bar for professionals seeking careers in incident response in 2011.
-
HealthcareInfoSecurity.com Week in Review for Friday, Nov. 5, 2010
05/11/2010This week's top news and views: AG Sues WellPoint Over Breach; Surescripts' Role in HIEs; Time to Revisit HIPAA Compliance.
-
Incident Response Trends for 2011
03/11/2010Georgia Killcrece: It's how you manage a security incident that counts.
-
HealthcareInfoSecurity.com Week in Review for Friday, Oct. 29, 2010
29/10/2010This week's top news and views: EHR Security: Lessons From a Pioneer; Grading Obama on Privacy; Strategic Tips on Wireless Security. And don't miss our audio week-in-review podcast by Howard Anderson, managing editor.
-
Attorney: Revisit HIPAA Compliance
29/10/2010The proposed HIPAA modification rule is a wake-up call for compliance, attorney Kirk Nahra says.
-
Editor's Choice: Top News and Views for October
29/10/2010Here's an audio compilation of some of the more interesting news HealthcareInfoSecurity.com reported in October:
-
ISACA on Risk, Compliance Trends
27/10/2010As risk management and regulatory compliance take on greater import within organizations, so do the principles of good project management.
-
Strategic Tips on Wireless Security
27/10/2010Choosing the right wireless devices is a vital component of a security strategy, says security adviser Kate Borten.
-
ID Theft: Mass. Man Shares Story
25/10/2010The first in a series of new interviews with the real victims of identity theft. Hear their stories, their struggles and their lessons learned.
-
Organ Donor Network Uses Authentication
22/10/2010The Nevada Donor Network is using authentication technology to help verify the identities of organ donors, says Ken Richardson, executive director.
-
HealthcareInfoSecurity.com Week in Review for Friday, Oct. 22, 2010
22/10/2010This week's top news and views: Fraud Law Compliance Training Lacking; Medicaid Breach Affects 280,000; Wireless Security: A HITECH Guide.
-
Risk Management: Articulating the Value
20/10/2010It's one thing to have solid enterprise risk management practices, but quite another to articulate their value to the greater organization.
-
What's Wrong with Application Security?
19/10/2010The level of application security threats is rising, but the level of response is not. "That's a serious disconnect," says Jeff Williams, chair of the OWASP Foundation.
-
EHR Adopters Need 'Culture of Privacy'
19/10/2010Physician group practices installing their first electronic health records systems need to "create a culture that values privacy and security," EHR expert Margret Amatayakul says.
-
Wireless Security: A HITECH Guide
15/10/2010As healthcare organizations make broader use of wireless networks and devices, they must develop an aggressive risk management plan to address security threats, says security expert Rebecca Herold.
-
HealthcareInfoSecurity.com Week in Review for Friday, Oct. 15, 2010
15/10/2010This week's top news and views: Massive Health Insurance Fraud Alleged; FTC: No Major PHR Breaches So Far; Claims Database Raises Privacy Concerns.
-
Creating EHR Privacy, Security Strategies
15/10/2010Hospitals and clinics need to take a methodical approach to privacy and security as they prepare to qualify for electronic health records incentive payments from Medicare and Medicaid under the HITECH Act, security adviser Phyllis Patrick says.
-
Infosec Evolution Mimics Immune System
12/10/2010"Signatures are not going to be the way of the future because we don't have time to put a name or a pattern on enemy behaviors and pass it out and block it," says Phyllis Schneck, McAfee chief technology officer/public sector.