Devising strategies for ensuring social media are not used in ways that violate patient privacy is one of the top trends for 2011, says Lisa Gallagher, senior director of privacy and security at the Healthcare Information and Management Systems Society.
Unfettered access to state data "is the kind of stuff that causes me to lose sleep at night," Delaware CSO Elayne Starkey says, in explaining new, stringent rules to let employees use their own smart phones to access state networks.
To help agencies secure their wireless networks and technologies, the Government Accountability Office came up with eight leading practices. For now, GAO says, wireless networks remain at an increased vulnerability to attack.
As healthcare organizations make broader use of wireless networks and devices, they must develop an aggressive risk management plan to address security threats, says security expert Rebecca Herold.
As hospitals and clinics develop strategies for complying with the privacy and security provisions of the HITECH Act and HIPAA, they must be careful not to overlook the additional risks involved in using wireless technologies.
As healthcare organizations make broader use of wireless networks and devices, they must develop an aggressive risk management plan to address security threats, says security expert Rebecca Herold.
Robert Siciliano, a McAfee security consultant and founder of IDTheftSecurity.com, says socially engineered scams that are SMS/text-based will create big headaches for banks and credit unions in the near future.
The recent news that Nexus One smartphone owners were unable to send or receive data is just a precursor to what security experts say is the next big threat to mobile phones and services - mobile malware.
According to Dr. Markus Jakobsson, a noted security expert in the field of phishing and crimeware, mobile...
Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.