Sign up | Login with →

Privacy

exclusive

How Big Data Will Change People Management Forever

November 19, 2013 by Bernard Marr

The Big Data Guru column.

Big data will have an impact in so many business areas. In this post I look at how big data is used in people management (or HR) settings to change the measurement, analysis and management of people forever. I believe big data can make a real impact in the area of people management, but only if companies invest in building the big data and analytics skills and expertise now.[read more]

The Department of Commerce Should Establish an Office of Data Innovation

September 30, 2013 by Daniel Castro

Photo credit:  Tim Evanson

The Department of Commerce should proactively search for more opportunities to unlock the potential of data-driven innovation. The importance of data to the U.S. economy continues to grow. For example, in the United States the economic value from health care data is estimated at $300 billion annually.[read more]

4 Million Patient Records Stolen in Second Largest HIPAA Data Breach

September 4, 2013 by Thu Pham

Advocate Health Care marks the second largest HIPAA data breach since the breach notification rule was implemented in 2009, losing more than 4 million patient records in a theft of four unencrypted computers. The data included personally identifiable patient information as well as clinical data, including diagnoses and health insurance information.[read more]

No Encryption or BAAs: Keep PHI Off Unsecure Clouds

August 1, 2013 by Thu Pham

While Google Drive is a classic example of what cloud computing can provide, it cannot meet the security requirements desired by the HIPAA mandate that was recently updated to include data storage/cloud service providers within the scope of liability. HIPAA comes with fines and penalties for breaches of patient data.[read more]

Is Your Data Secure? [INFOGRAPHIC]

July 30, 2013 by Mark van Rijmenam

A lot of consumers and organisations are using the cloud and all that data is stored in massive data centers all over the world. Google, Facebook, the NSA and many others have built gigantic data centers that can store up to a Yottabyte of data! But how secure is your data actually in those data centers?[read more]

Encrypting Backup Data for HIPAA and PCI Compliance

July 26, 2013 by Thu Pham

Stored data is a top target by hackers, especially the type of data that can be used for fraud and medical identity theft – within the healthcare industry in particular, encrypting stored data to meet HIPAA compliance is one way to avoid the HIPAA Breach Notification Rule and keep data secure.[read more]

The NSA, Link Analysis and Fraud Detection

July 25, 2013 by Dean Abbott

The recent leaks about the NSA’s use of data mining and predictive analytics has certainly raised awareness of our field and has resulted in hours of discussions with family, relatives, friends and reporters about what predictive analytics can (and can’t) do with phone records, emails, chat messages, and other structured and unstructured data.[read more]

Encrypting Data for Data Breach Prevention

July 23, 2013 by Thu Pham
2

The State of California released a report on 2012 data breaches that found 1.4 million residents would have had their information protected if companies had encrypted data in transit when sent from their company’s network. The report showed 131 data breaches affected 2.5 million Californians, as well as listing recommendations of how to avoid loss or theft of data.[read more]

What Data Do the Five Largest Tech Companies Collect? [INFOGRAPHIC]

July 21, 2013 by Mark van Rijmenam

What's Google got on you?

Big Data brings big privacy issues. Baynote has created an infographic that shows the vast amounts of different types of data collected by the five largest tech companies in the world -- Google, Apple, Facebook, Yahoo! and Amazon -- ranging from search queries, profile information to even your phone number.[read more]

HIPAA Violations Cost Health Insurer $1.7 Million: Lessons Learned

July 20, 2013 by Thu Pham

HIPAA cautionary tale

Reuters reports that WellPoint, Inc., the second largest U.S. health insurer, has reached a $1.7 million settlement with the Dept. of Health and Human Services as result of a data breach that exposed over 600k health records. Read on for possible technical and strategic security solutions to avoid a similar fate.[read more]

exclusive

What Is the Government Really Collecting From Your Phone? [INFOGRAPHIC]

July 12, 2013 by Philip Cohen

NSA & phone data

Now that the entire world knows that the US government is collecting information from its citizens' phones, you have to wonder how agencies like the NSA and Homeland Security plan to use that info. This infographic takes a somewhat whimsical look at the kinds of data the NSA is collecting.[read more]

Have Marketers Taken Big Data Too Far?

July 10, 2013 by Josh Polsky

Big Data paranoia? (photo: motifake.com)

Paula Rosenblum writes a fun piece regarding the creepiness of retailers using their Big Data. In it, she contends that targeting our past purchases to send us relevant offers is smart business, but that the use of retargeting tools and practices is downright creepy. But how creepy is it really?[read more]

Big Data: Transforming Information Security [VIDEO]

June 27, 2013 by Mark van Rijmenam

Eddie Swartz, Chief Security Officer of RSA

Eddie Swartz, Chief Security Officer of RSA, the Security Division of EMC, talks about how big data is transforming information security. He touches on four different topics within information security that can be approved thanks to big data.[read more]

Big Data Benefits versus Big Risks [VIDEO]

June 17, 2013 by Mark van Rijmenam

Big Data risks

The recent revelations about the NSA’s secret program makes people aware of the world of big data and the thin line between the benefits and privacy concerns related to big data. The challenge is to get all the great benefits from big data, while finding a balance with the loss in privacy.[read more]

Why, What and How to Encrypt: Security Expert Insights

June 15, 2013 by Thu Pham

Not sure if your organization’s sensitive data is properly encrypted? It’s time to be sure. Chris Heuman, Practice Leader for RISC Management and Consulting, broke down the reasons why (and how) in the latest webinar hosted by Online Tech. Here's a brief summary of his presentation.[read more]