Risk Assessment Help on the Way
Guidance in the Works, But Advisers Call for More
Smaller hospitals and clinics soon will get some extra help with preparing risk assessments. The Office of the National Coordinator for Health IT will create simplified guidance in the coming months on how to conduct an assessment. The guidance will be written for those who lack information technology expertise.
|
Top Seven Emerging Security Trends from 2011
Security services provider IID (Internet Identity) has published their picks for the top seven emerging security trends from 2011.
Issues gaining attention over the past year include the weakening of the digital certificate authorities, surges in malware targeting mobile devices, designer malware, and the rash of corporate network breaches - be they by hacktivists, nation-state supported hackers, or criminal syndicates.
To read this article in its entirety, please click:
Top Seven Emerging Security Trends from 2011
|
Disaster Recovery: Supply Chain at Risk
Every organization likes its business continuity/disaster recovery plan before a disaster, says Al Berman of DRI International. But in the aftermath? Different story - and one that must be addressed in 2012.
Berman visited Japan soon after its natural disaster in early 2011, and what he saw there is symptomatic of the business continuity/disaster recovery challenge felt globally.
To read this article in its entirety, please click:
Disaster Recovery: Supply Chain at Risk
|
Army Officially Activates First Dedicated Cyber Brigade
The U.S. Army last week inaugurated the first-of-its-kind dedicated computer network operations brigade.
The decision for the Army's Intelligence and Security Command (INSCOM) to assemble the 780th Military Intelligence Brigade was made in 2010, and the unit's colors were officially unfurled at an activation ceremony at NSA's Friedman Auditorium in Fort Meade, Md., on Dec. 1.
To read this article in its entirety, please click:
Army Officially Activates First Dedicated Cyber Brigade
|
Mobile Device Security Tips for 2012
Practical Advice for Minimizing Risks
The holiday season is here, and it's almost time to say goodbye to 2011. For information security folks in all industries, this is a great opportunity to reflect on the events of the year and finalize our plans for next year.
In the healthcare arena, 2011 has been a bad year for data breaches. A quick glance at the Department of Health and Human Services' "wall of shame" that lists major breaches makes it clear that there's been a disturbing rise in the exposure of protected health information.
To read this article in its entirety, please click:
|