Computing security includes identity management to ensure proper access controls to controlled or sensitive information and permission rights for individuals to view information and data maintained by others. Security is maintained by administrators with encryption and password control and through the use of tokens or biometric devices to ensure user identity.


CommentaryHealthcare leaders who have properly instituted an information security awareness and training program — and integrated it enterprise-wide — have positively influenced their organizational culture in the right direction, writes blogger Brian Evans.
Information Management NewsSecurity and risk leaders need to engage with the latest technology trends to manage risks, says Gartner
Information Management NewsAdvice on some of insurance IT executives' biggest challenges, including data security, cloud computing, and recruiting and retaining talent was offered during a town hall meeting at last week’s IASA conference.
Information Management's DM RadioPrivacy remains a hot topic these days, and for all kinds of reasons. Web technologies can now track each and every movement you make in a browser, then map that all back to your IP address. The selling point is always more customized content (usually ads), but whither privacy?
Information Management NewsAll companies are aware of the growing risk of cyberattacks, yet few are taking the steps necessary to protect critical information. The key? Senior managers need to lead.
Comments (1)
Information Management NewsWarnings about the Svpeng malware that targets cellphones are proving to be unwarranted panic, skeptics say. Others argue that it is too early to ignore this powerful new strain of mobile malware that has stolen the financial data of customers elsewhere in the world.
BlogIn many security breaches, the security technology put in place did not fail. The Cloud technology did not fail. The management of security failed.
NewsP.F. Chang's China Bistro, a chain of Asian-themed restaurants, said it's investigating whether it was the target of a data breach following a report that stolen customer data had appeared online.
BlogThe old adage, "You can't manage what you don't measure," still applies--and even more so today with healthcare organizations facing a number of external and internal security challenges.
Information Management NewsNew survey on the state of cybercrime highlights deficiencies in persistence and technological skills of organizations relative to cyber adversaries
TrendsThe average consolidated total cost of a data breach rose 15 percent in the last year
A recently released Accenture survey, "Eighty Percent of Consumers Believe Total Data Privacy No Longer Exists," outlines six ways in which consumers would like companies to be transparent about how their personal information is being protected.
Twitter
Facebook
LinkedIn
Please note you must now log in with your email address and password.