Tag Archives | privacy

Key Points on the Ponemon Study on Patient Privacy

Richard Santalesa over at the InfoLawGroup has a great outline of the recent Ponemon report.  He lists several important findings and is a great synopsis if you don’t want to read the whole thing.  Here are some of his thoughts: The ability to prevent and detect data breaches has made strides, but is far from […]

Read full story Comments { 0 }

Newly Released Ponemon Report: Healthcare Data Breach on the Rise

It’s that time of year again, where we look back at 2012 and assess the damage.  Last week saw the release of the Third Annual Benchmark Study on Patient Privacy & Data Security by Ponemon Institute, sponsored by ID Experts.  The report has some interesting findings about the state of healthcare patient privacy and frequency […]

Read full story Comments { 0 }

The True Cost of Data Breach Response

When a data breach happens the first thing you think about is what you are going to do next – the next hour, the next day, the next week.  Understandably time is of the essence.  Digital Forensics, state, federal, AG and victim notifications, PR efforts are all put on timelines.  Do this first, this second, […]

Read full story Comments { 0 }

Experian Data Breach – Congressional Woes

Experian Data Breach Woes – Updated 3/13/2013 – High Profile Data Breach hits Experian… Others. It has not been a good last few days for Experian.  I’ve been trying to think of an appropriate adjective for how they have handled the South Carolina Breach, something between bad and terrible but I’ve stopped caring.  South Carolina […]

Read full story Comments { 0 }

Creating a Culture of HIPAA Privacy and Security – Now With Tips!

A while back I wrote about creating a culture of privacy and security within an organization.  ID Experts, with the help of other industry experts, has just released “Five Tips to Make Patient Privacy Part of Your Organizational DNA” and it’s a great list.  The most recent trend has been towards making HIPAA privacy and […]

Read full story Comments { 0 }

You Are Your Own Worst Security

Social engineering has been around for a while and has been apart of some of the most well known data breaches in the history of the internet.  Kevin Mitnick’s social engineering is now a source of internet legend and Defcon now has a contest dedicated to it.  If you haven’t ever read about their exploits […]

Read full story Comments { 0 }

Security and Privacy Challenges Facing Education

Piggybacking on yesterdays data breach / data dump by TeamGhostShell & ProjectWestWind, SC Magazine has a great interview with Sanjeev Sah, the CISO of UNC-Charlotte.  Only 4 months into his job he was faced with a 350,000 person breach. “In May, the 50-year-old university provided the unsavory details of what happened: The Social Security numbers […]

Read full story Comments { 0 }

When a Data Breach Isn’t a Data Breach

Earlier this summer The Surgeons of Lake County experienced a data breach that might have scary tellings for the future.  Hackers breached their EHR system and instead of download the “payload” they encrypted the data in place, holding the key for ransom.  This data breach doesn’t look like the normal data breaches we have seen. […]

Read full story Comments { 0 }

The Risks from Non-Sensitive Information Released in Data Breaches

By now, the story of  Wired’s Mat Honan epic hack is all over the web.  Hackers were able to use publicly available information about Mat to socially engineer both Amazon and Apple’s security system to gain access to his whole digital life.   Slashing and burning as they went, the hackers destroyed Mat’s digital life on […]

Read full story Comments { 0 }

Who Owns Your Electronic Health Record?

As we race towards the full implementation of Electronic Health Records many of the privacy and ownership issues have not been fleshed out.  Doug Pollack wrote about ownership issues earlier this summer and the topic generated over 150 comments from all over the Health IT spectrum.  The topic was also picked up by Forbes in […]

Read full story Comments { 0 }