When it comes to security, many vendors consider certification of its products by an independent organization an option, not a requirement. However, third party testing is an important element when a company is deciding on technology solutions that are part of its security management program.
This month marks the 11th anniversary of National Cyber Security Awareness Month (NCSAM) where raising awareness about cybersecurity is a top priority for both the public and private sector.
The U.S. health care system is undergoing a slow but steady technological revolution driven by the passing of the HITECH Act and the EHR Incentive programs that have resulted in thousands of eligible providers and hospitals implementing certified EHR technology products.
One of the chief characteristics of the incentive programs that drive adoption is that in order to obtain these incentives it is not enough to simply purchase certified technology. That technology needs to be used, and continued to be used in a way that will improve health care delivery.
As this is my first post on ICSA Labs’ blog, I thought I’d take a little bit of time to explain how I currently see the malware world. For those who don’t know me, I’ve been dealing with viruses and assorted malware since 1987, which is about when the first viruses appeared.
We’ve just released a new whitepaper entitled Compliance, Incentives and Penalties: Hot Topics in US Health IT. If you live in the U.S., you might take a read as the topic of this paper—changes to healthcare—is going to significantly impact your interaction with the U.S.
On April 19, Verizon issued its much-anticipated 2011 Data Breach Investigations Report (DBIR). This report has become the seminal report for the security community, and is eagerly awaited for each year.
Some key takeaways from this year’s report:
ICSA Labs has expanded its offerings to include the testing of Health Information Technology (HIT) products. My name is Amit Trivedi, and I'm managing the health care program. While I'm new to ICSA Labs, I have been working in the health IT and security fields for many years - managing and auditing systems, developing criteria to test products, and advocating HIT standards and interoperability.