Breach Report 2010 documents the major happenings in PHI breaches over the last year.
Actual security vs. advertised state of security- whats the difference? Apparently enough to get breached.
Nasdaq has acknowledged that suspicious files were found on some of its systems. The files were apparently a result of hackers gaining access to at least one of their servers.
Also known as the LanMan, or LAN Manager hash, it is enabled by default on all Windows client and server versions up to Windows Server 2008 where it was finally turned off by default.
HITECH, and HIPAA Security Rule combined mean that covered entities need to ensure proper due-diligence when managing BAs.
Web applications are becoming an increasingly big part of healthcare. Because of this is is widening the target for hackers.
Sometimes, in the rush to be the first person to publish an idea or design; people will overlook security in the planning phase. Redspin would like to propose something different.
Should Healthcare choose the path of open sourcing? Eric Schmidt thinks this could/would work and should be the path taken.
People are still the weakest link in the security chain. Even if you are secured elsewhere the people working for you can give out access unwittingly.
Things are heating up over HITECH in the House of Representatives.