A presidential council's call for creation of a universal exchange language based on XML as a way to make electronic health records systems interoperable and ease the secure exchange of data is overly simplistic and impractical, some critics say.
Anti-fraud activist Jim Woodhill is a man with a plan - or at least he soon will be. By the end of March, he expects to have a task force and plan in place to help banks and businesses conquer ACH fraud and corporate account takeover.
Healthcare privacy and security issues rose to the forefront in 2010 thanks, in large part, to the HITECH Act, which led to many new regulations as well as a public list of major health information breaches.
"The environment that started by supporting whistleblowers ... is essentially morphing into 'Gee, we as an organization need to be completely transparent, whether we want to or not,'" says Cal Slemp, managing director of Protiviti.
Cyber criminals typically will move on to a target that is much less secure but those behind advanced persistent threats will spend months if not years trying to penetrate an IT system until they succeed, says Dmitri Alperovitch, McAfee Labs threat research vice president.
Delaware has implemented filters that block unencrypted messages containing the numeric pattern of Social Security numbers: three digits, two digits, four digits, state Chief Security Office Elayne Starkey says.