The billions of dollars worth of HITECH Act incentives available to hospitals and physicians using electronic health records are serving as a powerful catalyst for information security as well.
Implementing electronic health records software that includes security components is just the first of many steps involved in ensuring security, says Bonnie Cassidy, president of the American Health Information Management Association.
The president has levers of power that enables him to set the nation on a better path toward keeping our economy and citizens secure. They don't require congressional approval, but only political resolve and determination.
This week's top news and views: IT employment ends 2010 near a two-year high; IT security jobs are on the rise in 2011; and giving non-IT executives the responsibility for IT risk.
Community hospitals must become more vigilant about information security, especially as they apply for HITECH Act electronic health records incentive payments, says Chuck Christian, CIO at Good Samaritan Hospital in Vincennes, Ind.
Devising strategies for ensuring social media are not used in ways that violate patient privacy is one of the top trends for 2011, says Lisa Gallagher, senior director of privacy and security at the Healthcare Information and Management Systems Society.
Executives deal with risk all of the time, except that is, information technology risk. For many non-IT leaders in government and business, IT risk is outside their comfort zone. Oregon CISO Theresa Masse wants to change that.
Cyber criminals typically will move on to a target that is much less secure but those behind advanced persistent threats will spend months if not years trying to penetrate an IT system until they succeed, says Dmitri Alperovitch, McAfee Labs threat research vice president.
Incidents such as the WikiLeaks disclosures and resulting fallout push leaders to redefine their data protection agenda for 2011 and think about their organizations' vulnerabilities.
Federal agencies have until Jan. 28 to complete an assessment on how they handle confidential information, a process prompted by the WikiLeaks episode that exposed 250,000-plus diplomatic cables in November, says OMB Director Jacob Lew.
Researchers explore adapting geolocation technology to identify where data reside on the cloud so organizations can comply with IT security laws and regulations, RSA Chief Technology Officer Bret Hartman says.
Dmitri Alperovitch, McAfee Labs threat research vice president, discusses the company's annual threat predictions, saying: "We are seeing an escalating threat landscape in 2011."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.