12 steps for surviving an OCR breach investigation

12 steps for surviving an OCR breach investigation


12 steps for surviving an OCR breach investigation

Posted: 07 Jun 2011 06:41 AM PDT

ID Experts offers 12 steps to help covered entities identify key items in their privacy and security programs that will protect the privacy of their patients before a data breach, and ensure complianc...

25 percent of US hackers are FBI informants

Posted: 07 Jun 2011 05:58 AM PDT

Anyone who has read Kingpin won't be much surprised by the estimate recently made by Eric Corley, publisher of 2600: The Hacker Quarterly, who said that some 25 percent of US hackers are likely federa...

Security a top concern for mobile cloud-based applications

Posted: 07 Jun 2011 04:10 AM PDT

48 percent of a Vordel study respondents noted security as a top concern for connecting from mobile cloud-based applications into the organization. The security challenges included the question o...

LulzSec leaks Sony Developer source code

Posted: 07 Jun 2011 03:44 AM PDT

Nintendo has confirmed that the server configuration file published by LulzSec on Friday is the real deal, but says that that is the only thing they managed to access and that no third-party personal ...

RSA admits SecurID tokens have been compromised

Posted: 07 Jun 2011 02:20 AM PDT

RSA has finally admitted publicly that the March breach into its systems has resulted in the compromise of their SecurID two-factor authentication tokens. The admission comes in the wake of cyber...

Free tool for healthcare to handle privacy breach investigations

Posted: 06 Jun 2011 09:03 PM PDT

The U.S Department of Health and Human Services (HHS) Office for Civil Rights (OCR) has been cracking down on its enforcement of the HIPAA/HITECH Privacy, Security and Data Breach Notification Rules, ...

0 comments:

Post a Comment