HIPAA security checklist: 10 services your customers need

Recent changes to HIPAA and HITECH opened up significant new opportunities for security solution providers who can shoulder the risks and get themselves educated on these regulations. As this HIPAA security checklist of services, below, shows, there are 10 specific [...]

HIPAA security checklist: 10 services your customers need2020-04-29T22:42:23-07:00

HIPAA-compliant cloud storage services: Due diligence is key to survival

Many VARs are looking to profit from health care-related cloud storage services. But with profit comes responsibility. Whether you build your own or offer another’s service, the U.S. Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for [...]

HIPAA-compliant cloud storage services: Due diligence is key to survival2020-04-29T22:38:59-07:00

The HIPAAcrisy of Healthcare.gov

Kathleen Sebelius at a House Energy and Commerce Committee hearing Wednesday said she is responsible for the problems with Healthcare.gov.  Will she extend her ownership to the violations of privacy regulations? Will she own the pathetic demonstration that political expediency means more to HHS than the commitment to applicants’ privacy?  Will HHS be a little more forgiving the next time another organization gets investigated for a HIPAA breach or will Tavenner and Sebelius be HIPAAcritical?

The HIPAAcrisy of Healthcare.gov2019-04-09T00:25:08-07:00

Internet Security Threat Report 2013

Creating successful targeted attacks requires attackers to learn about us. They will research our email addresses, our job, our professional interests, and even the conferences we attend and the websites we frequent. All of this information is compiled to launch a successful targeted attack. Once on our devices, the attacker’s tools are designed to pull as much data as possible. Undiscovered targeted attacks can collect years of our email, files, and contact information.

Internet Security Threat Report 20132023-08-10T23:39:28-07:00

Don’t Take Your Privacy for Granted – 13,000 Requests for User Data

I am again reading another story about the NSA.  This one is from ZDNet titled, Yahoo Reveals US Government Made 13,000 Requests for User Data. I am finding myself struggling with a solid opinion on the controversy over the NSA [...]

Don’t Take Your Privacy for Granted – 13,000 Requests for User Data2023-08-10T23:41:41-07:00

Who Is Stealing Your Company Assets?

Dave Cunningham, our Business Technology Officer, has been doing some research on e-mail security and privacy for company executives.  In doing that research, he came across an interesting article on a survey that points out that one in three IT [...]

Who Is Stealing Your Company Assets?2013-05-24T17:07:18-07:00

Ransomware Gangs Are Now Stealing Passwords

A few months back I wrote a blog called, Don’t Get Caught by a Ransomware Gang.   The blog warned that ransomware gangs are loading malware onto computers.  Back then the threat was in the form of unwanted encryption of your [...]

Ransomware Gangs Are Now Stealing Passwords2018-08-22T11:24:07-07:00

Is Cloud Computing a Bunch of Hype?

If you read all the press releases from many of the new vendors then the answer is yes, there is much hype surrounding the “cloud”. If you read the results from the latest Tech Target Cloud Adoption Index you would [...]

Is Cloud Computing a Bunch of Hype?2023-08-10T23:43:53-07:00

The HIPAA Omnibus Rule Went into Effect on March 26, 2013

If you are a healthcare covered entity or a business associate to a healthcare provider you better get on your encryption game.  If you have not done your risk assessment you better do that, too.  Here is a good article [...]

The HIPAA Omnibus Rule Went into Effect on March 26, 20132023-08-10T23:44:32-07:00