FAQ about HIPAA Security Risk analysis answered for your reading pleasure.
N.Y.T. has reported on a recently exposed breach at the International Monetary Fund.
Here is how the EHR Technology certification process works
The RSA Breach, their initial reaction, and their follow-up communication regarding the Lockheed Martin attack (which they are admitting is related to the initial RSA breach) makes us question their priorities.
Third party Business Associates are now accounting for nearly 40% of data breaches of protected health information. This is an alarming uptick.
Several insights into what the OIG review could mean for you and your company. Additionally Redspin shares some recommendations.
As an independent provider of security assessments, we are keenly aware of the 2 primary drivers of an objective security assessment - security or compliance. Roughly, these two views of risk management can be thought of as similar in some ways but differing exponentially in others.
Account takeover fraud remains a major problem for financial institutions and small businesses that are impacted.
Now this week, we learn the HHS Inspector General has audited HIT Standards, privacy protection under HIPAA, and other security measures at CMS and the ONC. Their conclusion? "OIG found weaknesses in the two HHS agencies entrusted with keeping sensitive patient records private and secure." Such weaknesses included lax oversight and insufficient standards for healthcare providers.
Dan Berger's summary of the OCR/NIST HIPAA Security Conference in Washington D.C. 2011.