TITLE

Wireless security: It's up to you

AUTHOR(S)
Lowes, Robert
PUB. DATE
November 2006
SOURCE
Medical Economics;11/17/2006, Vol. 83 Issue 22, following p50
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the importance of encryption as a wireless security system used in protecting confidential medical records against the alarming presence of piggybackers and wardrivers. According to reports, piggybackers and wardrivers are spreading widely, covertly tapping into other's unsecured wireless networks. These illegal acts may be countered through encryption.
ACCESSION #
23238975

 

Related Articles

  • BEEFING UP SECURITY. Goedert, Joseph // Health Data Management;May2008, Vol. 16 Issue 5, p48 

    The article reports that healthcare organizations are strengthening security technologies in the wireless environment. Healthcare organizations such as the Intermountain Healthcare, have implemented encryption and authentication software from Cisco Systems Inc. The improvements made ensure the...

  • Study On Key Technology For Encryption And Security System In Wireless Communication Network. Hsien-Wei Tseng; Rong-Hou Wu; Chih-Yuan Lo; Yang-Han Lee; Liang-Yu Yen // Annual International Conference on Infocomm Technologies in Comp;Oct2010, p60 

    A novel secure encryption using the recieved signal strength indicator (RSSI) has been proposed in this paper. RSSI signals are time variant and irregular, especially in more complicated environment. Changes of RSSI can generate a nonperiodical random number, and an attacker will hardly predict...

  • Safe and secure? Conn, Joseph // Modern Healthcare;5/11/2009, Vol. 39 Issue 19, p30 

    The article focuses on the guidance issued by the U.S. Health and Human Services (HHS) for the technologies and methodologies that can be utilized to make patient-identifiable medical records and data unusable, unreadable or indecipherable to unauthorized users. The guidance covers data storage,...

  • Worried About Stolen Laptops? Help is Here. Scott, Mike // H&HN: Hospitals & Health Networks;Feb2007, Vol. 81 Issue 2, p24 

    The article presents information on security devices for hospitals, including Mighty Key, a personal computer and laptop protector, detection software from Reconnex Inc. and CyberAngel data protection and tracking recovery solution from CyberAngel Security Solutions Inc.

  • Watchdog steps in over NHS data. Ward, Mark // New Scientist;1/20/96, Vol. 149 Issue 2013, p9 

    Reports that the Data Protection Registrar of Great Britain will investigate doctors' fears that hackers may see computerized medical records. Wrangling between the British Medical Association (BMA) and the Department of Health over the security of the national Health service's data network;...

  • Digital records balance privacy concerns. Albertson, David // Employee Benefit News;Mar2000, Vol. 14 Issue 3, p11 

    Focuses on the issue of medical data protection and privacy in the United States. Rule on accessing medical records and patient confidentiality; Introduction of electronic database of medical records of patients; Overview of several Internet-based health care products; Significance of these Web...

  • Hurry up and wait. Isenstein, Howard // Modern Physician;Oct99, Vol. 3 Issue 10, p26 

    Talks about a legislation for the protection of the confidentiality of medical records in the United States. Deadline for passing the legislation protecting the privacy of electronic medical records; Issue over the creation of the bill; Penalty provisions in the proposed Senate privacy legislation.

  • Circulation: Journal of the American Heart Association.  // Biomedical Market Newsletter;6/1/2012, Vol. 21, p1 

    The article offers information on the development of innovative safeguards which are designed to misuse of genetic data of the patients.

  • Mobile device lockdown. Cummings, Joanne // Network World;3/19/2007, Vol. 24 Issue 11, p40 

    The article provides information on the five fundamental steps needed to guarantee data safety in mobile devices. According to the author, securing company data in needed to protect company's interest, resources and customers' welfare and to avoid any further damages that it may contribute. The...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics