University of Berkeley researchers have revealed a technique for identifying individual web pages visited ‘securely’ by users, with up to 89% accuracy, revealing data such as health conditions, financial details and sexual orientation.
Did you know that medical data on 20,000 people may be exposed to abuse today? As a healthcare practitioner, you may not be aware of the value of the data in your care, but criminals certainly are.
The Target security breach and the Snowden revelations about NSA surveillance have raised awareness of data privacy to new levels, making Data Privacy Day more relevant than ever in 2014. And yes, Data Privacy Day is a real thing, observed on January 28.
Domestic violence is not something that gets discussed much in information security circles, but there are few people that need advice on assuring their online safety more urgently than victims of stalking and domestic abuse. What can people do to protect themselves when there is a known and persistent threat?
This is a quick reminder that the September 23 deadline for compliance with the new HIPAA regulations is rapidly approaching. Organizations that handle protected health information (PHI) need to be sure they are up to speed on the changes and ready to withstand scrutiny. In general, you will need new NPPs and BAAs (Notices of
An infographic of recent healthcare IT security statistics paints a striking picture of much security work yet to be done, even as new medical privacy regulations go into effect.
Is your company ready for September 23, 2013, the deadline for compliance with HIPAA 2.0? The revised omnibus privacy and security regulations incorporating HITECH expose a lot more companies to possible fines.
The Xbox One Kinect microphone – one of the hi-tech new features of Microsoft’s new Xbox One console – has raised security concerns since it “listens” to users even when the console is turned off.
Britain’s hi-tech government intelligence agency GCHQ should know better than to send passwords in plain text via email – but has been doing so due to “legacy systems”, it admitted in a statement this week.
A prototype multi-cursor system designed to improve the security of on screen password entry has been posted onto DigInfo, the Tokyo based news site that promotes cutting edge technology from Japan.
Results from an eight country Accenture survey shows that US doctors surveyed have mixed feelings about electronic patient records (EPR). While some 82 percent want patients to update their own records, only a third (31 percent) believe they should have full access.
According to the PwC Top Health industry issues of 2013 report, healthcare managers and consumers are increasingly concerned about the rise of healthcare workers using their own devices within hospitals and other healthcare centers.
A French-Moroccan national was jailed by a Dublin court after being found guilty of hacking into the business accounts of an online betting company, according to the Irish Independent.
We tend to replace our computers more often these days but how do you ensure that you don’t give away your data when you pass on that old desktop or laptop? Here are our top tips for safer computer disposal. Back up your data Before you do anything with your existing PC or laptop, ensure
Are younger people less aware of online security risks, or do they simply prefer to take more risks with their personal information? That’s one of the questions raised by the findings of our recent poll of 2,129 U.S. adults (aged 18 and over) by Harris Interactive.
In our last post (part 1 of 2), we dove into Facebook timeline privacy and security, prompted by the universal imposition of the timeline view that is currently under way on the world’s largest social network. In this second part, we continue reviewing our Facebook timeline from other people’s perspective, using a tool called View
With the recent announcements of password breaches at LinkedIn, and warnings from Google about state-sponsored attacks on Gmail accounts, it seems like a good idea now to review some password security basics. In this blog post, we’re going to take a look at a rather low-tech solution to a decidedly high-tech problem: How to guard
Like Facebook, Twitter wants to know which websites you visit and so it has a system for tracking you as you click from site to site, a fact that leads to a pair of interesting questions: “Did you know that?” and “Are you okay with that?” As we will see in a moment, this system