In the news
August 24, 2015  |  ComputerWorld

U.S. electric utilities should pay close attention to their authentication systems and access controls to reduce data breaches, a government agency says in a new cybersecurity guide.

About 5 percent of all cybersecurity incidents that the U.S. Department of Homeland Security's industrial control cyber team responded to in 2014 were tied to weak authentication, said the U.S. National Institute of Standards and Technology (NIST). Another four percent of industrial control incidents were related to abuses of access authority, the agency said.

In the news
August 16, 2015  |  ExecutiveBiz

The Maryland-based National Cybersecurity Center of Excellence is searching for industry sources to develop a cybersecurity system intended to help control access to information technology assets. 

Contractors would design three projects around access control, personal identity verification credentials and mobile devices, theNational Institute of Standards and Technology said Friday.

August 13, 2015

Today's Federal Register contains notices inviting technology vendors to collaborate with the NCCoE on three new projects to provide mobile device security, attribute based access control, and derived personal identity verification (PIV) credentials for mobile devices. Commercially available and open source products will be the modules in end-to-end example solutions to these challenges.

In the news
August 13, 2015  |  mHealthIntelligence

With more health records being stored on mobile devices, the need for mobile health security is imperative among doctors, nurses, and other medical professionals.

In the news
August 12, 2015  |  Corporate Counsel

NIST’s “Securing Electronic Health Records on Mobile Devices” gives organizations involved in the health care sector insights on how to design and implement security systems that protect the myriad personal and health information patients entrust them to collect and keep private. Although fairly technical, the guide helps focus organizations’ conversations around keeping electronic health records protected.


In the news
August 11, 2015  |  JDSupra

On July 22, the National Cybersecurity Center of Excellence (“NCCoE”), a U.S.

In the news
August 09, 2015  |  Health IT Outcomes

The National Institute of Standards and Technology (NIST) has released a draft guide designed to help healthcare organizations increase mobile data security. The guide, NIST Cybersecurity Practice Guide, Special Publication 1800-1: Security Electronic Health Records on Mobile Devices, is a response to the growing need created by increasing use of smartphones and other mobile devices to transmit healthcare data.

In the news
August 09, 2015  |  Lexology

As medical records are increasingly digitized, providers of health IT products and services and medical providers who store sensitive patient health information present tempting targets for attackers.  Medical providers now regularly use mobile devices in their practices, but NIST notes that “the use of mobile devices to store, access and transmit electronic health care records is outpacing the privacy and security protections on those devices.”  The Department of Health and Human Services maintains a 

In the news
August 04, 2015  |  Mondaq

On July 23, the National Institute of Standards and Technology (NIST) through its National Cybersecurity Center of Excellence (NCCoE) published a draft step-by-step practice guide on protecting medical information stored in and shared between mobile devices, such as tablets and smart phones. NIST issued a press release about the draft guide.

In the news
August 03, 2015  |  Lexology

With health care breaches constantly on the rise, increasing access to electronic health records (EHRs) from mobile devices, and more prevalent “shadow” cloud use, health care organizations are getting a bit of help from the National Institute of Standards and Technology (NIST) with a draft cybersecurity guide: “NIST is soliciting stakeholder comments due Sept. 25, 2015.