Recommended reading: clear analytical insights in a cluttered sea

With all the attention focused on privacy and security these days, any significant development or incident gets tremendous online coverage. This is at one a good thing and a terrible problem. We’ve noted before the difficulties…

Hacking of high school grading system raises key security practice issues

Although it is one of the top-ranked schools in high-performing Montgomery County, Maryland, in the past few months Winston Churchill High School has been more noteworthy for the alleged hacking by students into the school’s grade…

Read-only computer security hardware device claims to be hack-proof

Despite the dismissal-as-foolishness that such claims often bring, security start-up vendor InZero Systems is marketing a sort of hardware proxy device that it claims is hackproof. As featured in an article in the March 8, 2010…

It’s hard to determine system security requirements in the absence of solution architecture

In the health IT arena, a lot of energy is currently focused on measures, criteria, and standards with which health care providers and other entities can demonstrate “meaningful use” of electronic health record (EHR) systems and…

With all the focus on confidentiality and privacy, what about health IT availability?

Most of the major information sharing initiatives under development today are designed with integration patterns that assume that most data will be accessed from the authoritative systems or organizations where it resides, rather than copied to…

Lack of common security standards complicates health information exchange

A recurring challenge facing efforts to implement interoperable health information exchange solutions is agreeing on a common set of security standards that can be applied to both private and public sector participants in such exchanges. There…

Will complying with requirements in 201 CMR 17 give any tips to healthcare entities?

With the rapidly approaching March 1 deadline when Massachusetts’ new personal data protection law (201 CMR 17) finally goes into effect, one of many requirements facing organizations covered by the law is the need to encrypt…