Skip to main content

Home/ ITGS News/ Group items tagged security

Rss Feed Group items tagged

Noreen C

U.S. Tries Open-Source Model for Health Data Systems - NYTimes.com - 1 views

  • easily and securely share information
  • A fancy electronic patient record, unconnected, is just an expensive way to capture data.
  • Getting many different health care providers and suppliers of specialized software to agree on how to do that is no simple task.
  • ...2 more annotations...
  • The solution the group agreed to is essentially Internet-based e-mail and public key encryption technology, tailored for health care.
  • For health care technology companies, the data-sharing standards, experts say, should stimulate the market for electronic health records and allow them to focus their efforts on making their individual offerings more affordable and easier to use.
  •  
    This article is primarily about setting standards and protocols so that an electronic health records could world easily and securely for many health care providers and suppliers. The reason the introduction of an EHR hasn't worked before, is that there were no data-sharing standards, which would ensure that the data is transmitted securely across the internet. These standards are also in accordance of many of the interests of all of the health providers and stakeholders involved, which was a major problem previously. Without the issue of connecting the EHR from provider to provider, then the records would be a "fancy...way to capture data," and it's full potential would never be recognized. However, these new standards and protocols, filled with secure transactions based on encryptions, have made the introduction of an electronic health record possible. There are many benefits to the use of an EHR, including productivity and financial improvement for the companies and the employees. For example, doctors/nurses no longer need to spend time pulling a patient's file, or writing the details of the visit afterwards. There are also fewer repetitive tasks, and improved communication between doctor and nurse, or doctor and another doctor. Quality of care may also improve because doctors have quick access to a patient's information, there is better monitoring and discovery of chronic illnesses, and doctors can return phone calls/ provide medication refills immediately. Also, in general, the electronic charts allow for a more efficient office, which leads to a less stressful environment and more attention on the patients' care rather than searching for their charts. This can only be done through the introduction of an EHR, leading to easier queries, instant reorganization, and file management that could be transmitted to both the patient and any other doctors. This minimizes the ambiguity of not having tests results from one doctor, and allows all doctors treating a p
  •  
    patient to see all of the patient's history. This is important in having a correct diagnosis and treatment. However, there are also some drawbacks. Initially, doctors who chose to engage in the implementation of a EHR, see some decreases in productivity. This is because entering information and learning how to use the software takes some time. Some doctors also do not have the money to invest in such software and accompanying hardware to, and others no not want to because they are accustomed to their hand-written charts. There are also some security issues, leading to greater privacy issues. The EHR maintains very personal data about a patient, and if the records are breached, then the privacy of the patient may be put at risk. There is also the issue of interoperability, which was brought up in the article. Many of the companies in different countries wishing to engage in the implementation of EHR have different standards involving the usage. This could harm the usage of an international EHR.
Madeline Brownstone

BBC NEWS | Programmes | Click | Biometrics to enhance security - 0 views

  •  
    With the growing number of stories about data being lost some institutions have been looking for a new more secure solution. Many are introducing a form of biometrics - a way of recognising something about you that marks you out as unique.
  •  
    With the growing number of stories about data being lost some institutions have been looking for a new more secure solution. Many are introducing a form of biometrics - a way of recognising something about you that marks you out as unique.
Madeline Brownstone

BBC NEWS | Programmes | Click | How biometrics could change security - 0 views

  •  
    Recent losses of personal data held on discs, laptops and USB keys by governments and companies have highlighted the need for better security. Here Dan Simmons looks to see if biometrics can help.
  •  
    Recent losses of personal data held on discs, laptops and USB keys by governments and companies have highlighted the need for better security. Here Dan Simmons looks to see if biometrics can help.
Ram Bhadra

Usage of weak encryption codes in RFIDs - 0 views

  •  
    In big corporations such as Wal-Mart, the use of RFIDs has increased, but the disadvantages of RFID is now a serious issue. With the use of RFIDs on items, the customer is able to avoid waiting at a register, and the RFID will charge the person's credit-card. Yet the tags embedded in the items bought, such as clothing, can be tracked down by the store management systems, risking customers' security and privacy. Since RFIDs do not require a power supply or batteries to operate, all that is needed is a wireless scanner, which Wal-Mart's managing system uses to keep track of the items. Privacy has now become a major issue within the use of RFIDs for many Wal-Mart customers. Also, in many credit cards and "gas-cards", RFIDs are being used, yet the information on the tags also stays within the system. At airports, many modern passports are now using RFID tags that can be scanned from a range as far as 30 feet. Thus this results in chaos for the passengers, and an issue in being able to control the airport security properly.
  •  
    Large scale businesses like Wal-mart and government authorities in passport make use of sophisticated RFIDs which make the data stored in them or to be accesses through them safe, which helps them keep their business data or data of the clients(in some cases passport holders) safe, however many corporates make use of cheap RFIDs which have a weak encryption code to protect them. This code can be broken easily and hence the client of that RFID is vulnerable to hackers. Ford for example makes use of RFIDs manufactured by Texas Instruments, in their car keys. These RFIDs are protected by very weak codes, hence it is easy for thieves to break the code and steal cars.
Carmen M

RFID security, data protection and privacy, health and safety issues - 0 views

  •  
    This was a rather long but interesting article to read regarding RFID. It starts out by stating what RFID is and how it is being planned on being introduced across many stores. What made this article informative was that it discussed not only the first thing that comes to mind when we hear this, privacy and security, but also possible health and environmental issues. Security was a big issue discussed. Concerns that came up was who would manage the information picked up by RFID's? Can this be used to track people? Can personal items or documents integrated with RFID track a specific person? Would they know? To what extent does this violate privacy? Are there laws to prevent any form of privacy violation? The article also stated people might have a choice whether or not to use the RFID and what would be the other option. Another issue stated was a health issue. Since this uses radio frequency waves, can this pose any damage to lets say tissue cells? The hypothesis was that no because it uses different kinds of waves than other technologies. However, this technology is too early in its stage to know for sure. Another concern was the disposal of this technology. What effect would it have on the environment. Again, it was too early to determine for sure.
Madeline Brownstone

BBC NEWS | Technology | Workers 'stealing company data' - 1 views

  • "The industry has concentrated on the protection of the containers where the data is stored like firewalls, access, controls and end point security systems. "The end result is that most security teams are protecting the containers not the data itself. And that is a core flaw in the security methodology of many practitioners today," claimed Mr Rowney.
    • Madeline Brownstone
       
      With so many employees who have access to the data, what's to block it's flow?
  •  
    "He added: "The intellectual property of a company can represent the crown jewels and are almost worth more than the building. This is the core asset of a company and any breach or loss can be very expensive." "
Jaymee C

I'm in Your Google Docs, Reading Your Spreadsheets - NYTimes.com - 0 views

  • There was a time when it would have taken a fair amount of criminal activity to get access to this much information about a company’s internal workings and Web site performance. Now an employee can accidentally drop it into the lap of a random outsider without even knowing that anything is amiss. That’s the power of cloud computing at work.
  • Sharing documents with your co-workers via Google Docs sure is convenient. It can also be hazardous. Make one little typo and your sensitive data could fall into the hands of… someone like me.
  •  
    This article is about a man who received spreadsheets and documents from a newspaper company that was not supposed to be sent to him but to an employee who had a similar name. The typo problem had caused a security issue to arise. The stakeholders include: the employee who sent the message, the man who received them and the company. The employee might have to be repremanded if the writer of the article were to use this information against them. In the same respect, the company would be in trouble if this information was very private and it we released to the general public. The fact is that the security of using googledocs is questionable if users are not careful.
Carmen M

Home Office Data Security: Protect Customer Info - And Your Small Business - 0 views

  •  
    This article talks about Data security regarding information kept in a computer. The stakeholders in this case are the employee and the customer. The IT system is, like previously mentioned, a computer. The issue regarding the system is reliability. If you have a customers information such as credit card numbers and other personal data, then security and reliability definitely come up as an issue. Computers are prone to get viruses which could wipe out all the information stored on your hardrive. Hackers and other spyware can also be another concern. Your customer is trusting you with their information. The article also proposes a solution. The solution would be to have two separate computers, one for personal uses and the other for work. That way, eliminating visiting websites that might have viruses.
Yuval S

NAEA Deployed CipherOptics Advanced IPSec Network Encryption Solution - 0 views

  •  
    Cipheroptics give data security and network encryption solutions to security enterprises, financial institutions, health care, and government agencies. NAEA (North American Energy Alliance) utilized Cipheropitics to protect their data, using encryption. Dominick Birolin, the network engineer for NAEA, states that the company was "looking for a solution that could protect our critical cyber assets and meet our unique deployment requirements when we found CipherOptics." They chose this over others because CipherOptics offers security solutions for high performance networks. In addition to that, "the company's wire-speed encryption appliances are able to secure any network without changing the underlying infrastructure or application performance." Encryption works: initially by the business putting the sensitive data in plaintext. Plaintext is the normal, readable digital text. The business, using Cipheroptics, then converts the text into ciphertext. This text is made in a way that it can only be read by someone who has the key to put it back into plaintext and make it readable. The business holds the private key, which enables them to encrypt, and keep private, the data while still managing to access it when necessary.
Kim T

iTunes warning as thousands of fraudulent accounts are auctioned online - 1/7/2011 - Co... - 0 views

  •  
    Purchasing songs, apps, movies, and etc on ITunes requires each user to have an ITunes account. Upon signing up for the account, a valid credit or paypal account must be entered to pay for any purchased items. These purchases are made using a SSL (secure socket layer) connection so that when the user sends their information to ITunes to set up an account, log in, or purchase an item, the information they are sending is encrypted.The sender is given a public key to show that he or she was the one sending the message and ITunes will get the private key. The data is encrypted using a code that will translate the data into a message incomprehensible to others if not decrypted using a private key. Once it has reached the ITunes database after being sent over the network, the private key will decode the message and proceed with the transaction.  However, the problem lies within the process of setting up an account. Many customers' itunes accounts are being hacked into and sold online to other people in China. Hackers are still able to find and intercept customers' information, such as their passwords or credit card number, and use it to sell to other people. Passwords may be too weak in some cases or authentication by the itunes store may be too weak. The issue of security is therefore involved as sensitive information can be accessed by others. The customers are affected since they are being charged for items that they are not purchasing. The company, Apple, is also affected negatively since their customers may not feel safe buying from them anymore and therefore losing business. Then there are the hackers who are benefiting in such a situation, profiting off of other people illegally.
Madeline Brownstone

BBC NEWS | Technology | US urges 'cyber hygiene' effort - 0 views

  •  
    Phishing attacks are specifically aimed at getting people to divulge personal information like social security numbers or bank details.
  •  
    Phishing attacks are specifically aimed at getting people to divulge personal information like social security numbers or bank details.
Madeline Brownstone

New Independent Reports Validate Websense Effectiveness and Leadership in Web Gateway a... - 0 views

  •  
    Websense is the service used by NYC DOE
Madeline Brownstone

Healthcare Industry Turns to DeviceAnywhere to Bring their Products and Services to the... - 0 views

  • Quality of service can't be left to chance for any healthcare provider developing mobile applications.  However, this is especially true when the health insurance company is part of the largest single health carrier in the United States, providing health care services to more than 25 million consumers with a network of approximately 590,000 physicians and care professionals nationwide. For an organization of this size, they often select technology partners such as DeviceAnywhere, who share their company's commitment to excellence and innovation.
  • Not surprisingly, security and reliability resonate as two of the top priorities for Sensei Inc. as well.  As a provider of innovative mobile and Web-based solutions that prompt consumers at point-of-decision moments to make healthier eating, medical and lifestyle choices, Sensei relies on DeviceAnywhere to ensure that their consumers receive their personalized nutrition and health counseling on a consistent and confidential basis. After all, when customers count on Sensei mobile programs for critical reminders to take their medications or make on-the-spot decisions related to healthy eating choices, there is no room for error in downtime or compatibility issues between users' devices and networks.
  •  
    Not a legit news source, actually a puff piece for Deviceanywhere. However, it points to issues around mobile phone use in health services.
sarah d

What's Lurking in That RFID Tag? - 2 views

  •  
    After the professor of computer science and technical director of the Information Security Institute at Johns Hopkins University and his students broke the encryption of a popular RFID system in car keys, it was apparent that there is a security issue when it comes to the use of RFIDs. The stakeholders are consumers who use products that have radio frequency identification systems embedded in them. As seen from the experiment done by the professor and his students, people can have their cars broken if the encryption of this identification is broken. The area of impact is business because this identification is on items sold in stores. The IT system is RFIDs, which are radio frequency identification. These forms of identification are similar to bar codes because when scanned can show people the price of items. However, being more advanced, RFIDs also show what the item is, the trends in sales and much more.
Rubayeth M

Ohio bans offshoring as it gives tax relief to outsourcing firm - 2 views

  •  
    In Milford, Ohio the governor Ted Strickand is trying to stop all outsourcing because his two major reasons are the "threat of of a job but an IT security risk." Then it goes more deep saying how more than 90% of the workers are Indian and 7% and lower have job in America. Strickland is more concerned with the issues which are jobs, data security, privacy,and identity theft risks.
Madeline Brownstone

BBC NEWS | Technology | Malicious insider attacks to rise - 0 views

  •  
    ""The malicious insider is classed as the greatest security concern because they have access, and relatively easy access, to corporate assets," said Mr Leland."
Madeline Brownstone

BBC News - German government warns against using MS Explorer - 0 views

  •  
    "The German government has warned web users to find an alternative browser to Internet Explorer to protect security."
Madeline Brownstone

BBC News - Data losses to incur fines of up to £500,000 - 0 views

  •  
    "The Information Commissioner's Office will be able to issue fines of up to £500,000 for serious data security breaches. The new rule is expected to come into force in the UK on 6 April 2010. It has been approved by Jack Straw MP, Secretary of State for Justice. "
Mohammad A

"1986 Privacy Law Is Outrun by the Web" - 0 views

  •  
    This article is about privacy issues within the Internet. As web services have improved, aspects such as spreadsheets, e-mail services and photography applications, the topic of privacy has now been "removed". The internet has been the leading factor in many issues with privacy. One of the main examples mentioned is the site WikiLeaks, which is entirely based upon a hacker who exposes the truth about everything and anything. Julian Assange is one of the leading activists who promotes free speech within the world to expose privacy. The IT system involved within this scenario is basically the data transfer through networks and servers online. The people who are being affected by this issue are those who's personal information is leaked (in any way, whether through WikiLeaks due to a political scandal or through hackers obtaining their information). Thus certain security measures are to be taken to prevent unwelcome access to personal and private information. For example, encryption is now one of the most famous and useful methods of preventing hackers from entering databases and other online servers. An encryption key allows for the safe keeping of personal information.
Mariam B

In Haiti, Practicing Medicine From Afar - 0 views

  •  
    This article deals with how telemedicine was used following the earthquake that occurred in Haiti in order to provide medical care to patents and individuals. The stakeholders in this scenario include the patients and doctors in Haiti and the doctors/hospitals in the U.S. They are able to use satellite technology and wireless internet, in order to bridge the gap between both areas and provide people with access to medical care. Satellite technology is used to communicate between doctors in the U.S with clinics in Haiti. This provides real time service to patients, where the doctor is providing a consultation and diagnosis immediately to the patient. This technology also allows doctors in the U.S to perform surgeries since the satellite technology is able to support telemedicine because it provides a high amount of bandwidth. Additionally, in Haiti they are using high speed wireless internet throughout certain regions. The radio system is used in extreme cases where more advanced technology is not available, but still allows doctors from two areas to communicate with one another. Images and messages during consultations are sent through a secured network, so the data of the patients is kept private. Obvious benefits of using this technology include that people are able to get access to medical care and this decreases the digital divide and globalization. This is because people are able to get more care and consultation through using this IT technology, which would not have been available without telemedicine. However, some issues still arise despite these benefits in medical care. This includes the security of information and privacy of the patients. In this case, the article states that the internet messages are secured so that there is not privacy breach. This must be done using encryption technology so that people are not discouraged from using telemedicine and so that no private patient information is leaked or seen by unwanted users.
‹ Previous 21 - 40 of 108 Next › Last »
Showing 20 items per page