A recently released presidential council report, while raising important issues, oversimplifies the challenges involved in securely exchanging health information, says Joyce Sensmeier, vice president for informatics at the Healthcare Information and Management Systems Society
It's not enough to recover data after an incident; also essential is restoring the software needed to read the data, as Federal Emergency Management Agency has learned. The inspector general explains it all.
"We cannot allow security breaches to undermine our trust in the U.S. economy," says Sen. Robert Menendez, the New Jersey Democrat who says he'll introduce the bill. "We must step forward and curb these attacks without delay."
Interest in cloud computing is on the rise, but security concerns linger. This white paper addresses how to mitigate those risks, including:
Developing a secure, holistic infrastructure that encompasses both physical and virtual computing systems;
Establishing high-level information security policies for...
Organizations investigating cloud computing must consider many different options, including public, private and hybrid clouds. And each approach poses different risks. This white paper addresses:
Choosing a cloud computing solution;
Addressing the risks associated with moving to the cloud;
Planning IT services...
Security professionals at organizations adopting cloud computing solutions must put in place policies, processes and relationships that will result in keeping enterprise data safe. This industry perspective recommends:
Adopting high-level information security policies as well as granular procedures and standards...