Community hospitals must become more vigilant about information security, especially as they apply for federal electronic health records incentive payments, says Chuck Christian, CIO at Good Samaritan Hospital in Vincennes, Ind.
The possibility grows that hackers could take away control of the car from drivers as more automakers provide vehicle-to-vehicle and vehicle-to-infrastructure communications networks to third-party development.
American consumers need to know that personal health records must follow government-mandated guidelines for ensuring privacy and security, just as is the case for electronic health records. Otherwise, the use of PHRs may never become widespread.
Despite efforts to tighten security to prevent such digital invasions, the military understands such breaches could still occur, which led Lynn to say the military must develop and train its cyber defenders to act in a degraded information environment.
A total price tag of nearly $1 billion for dealing with the aftermath of major breaches reported to federal authorities so far should motivate healthcare organizations to take aggressive steps to improve security, one analyst advises.
Los Alamos National Laboratory has spent $45 million to secure its classified computer network over seven years, according the GAO, yet significant weaknesses remain in safeguarding its classified computer network.
Please join distinguished analyst John Pescatore, of leading analyst firm Gartner, and Andre Gold, founder of Gold Risk Management & former security head at ING, for an exclusive on-demand webcast: "Staying Ahead of Changing Threats."
View this on-demand webinar now to learn:
Which attacks are happening now and...