Rick Kam
The days of James Bond and his world-saving exploits are over. In today's reality, nation-states and their criminal partners can disrupt commerce and defenses in the free world from the safety and comfort of their computer desks.
CISO survival guide: Tactics for easing the transition to risk management in ways that succeed for both the company and your own career.
Healthcare organizations need to plan for security in the transmission, storage, and use of potentially massive amounts and new kinds of data that devices such as Google Glass will create, and that includes educating patients that data thieves may be lurking behind free health applications.
The missing ingredient in many PHI privacy and security efforts? The patient. Rick Kam offers suggestions on how to change that.
When it comes to protecting patient health information, it's what's lacking that matters most. The forthcoming Health Information Privacy Bill of Rights might help.
With mobile devices growing in number and scope, the risks they present are, too. Covered entities can, and must, commit to protecting patients' privacy.
When putting protected health information into the cloud, healthcare organizations need to consider the legal liabilities. That starts with controlling your response to data breaches, and includes an incident response plan.
Safeguarding protected health information is getting thornier, and new federal initiatives not only crack down on HIPAA covered entities but also extend the reach of their responsibility for protecting such data into trading partners. Here's what you need to know about your business associates security practices.