Alvaka's Blog

Stay Informed And Up To Date On The Latest In Cyber Security

Alvaka Blog2026-03-11T18:09:45-07:00
2907, 2014

Unclear HIPAA rules permit healthcare data offshoring … for now

By |July 29th, 2014|Healthcare, IT Management, IT Planning, Security|Comments Off on Unclear HIPAA rules permit healthcare data offshoring … for now

...Under the Final Rule, the OCR has the power to domestically deal out civil penalties, corrective actions and long-term monitoring, while the DOJ has the power to domestically deliver a criminal prosecution. Through enforcement under [...]

1507, 2014

Electronic health records ripe for theft

By |July 15th, 2014|Healthcare, IT Management, IT Planning, Security|Comments Off on Electronic health records ripe for theft

The only difference in healthcare is that the large breaches have not gotten the sensational, but appropriate coverage credit card breaches have gotten.

Three other interesting quotes:

1.      As health data becomes increasingly digital and the use of electronic health records booms, thieves see patient records in a vulnerable health care system as attractive bait, according to experts interviewed by POLITICO. On the black market, a full identity profile contained in a single record can bring as much as $500.

2.      “Criminal elements will go where the money is,” said Wah, who was the first 

807, 2014

HIPAA consulting and the channel’s ethical responsibility

By |July 8th, 2014|Healthcare, IT Management, IT Planning, Security|Comments Off on HIPAA consulting and the channel’s ethical responsibility

Kevin is a featured writer for TechTarget.  Here is is latest column: _________________________________________________________ A few months ago, I wrote an article about the practice of non-attorneys consulting on HIPAA business associate agreements. After talking with [...]

3006, 2014

HIPAA business associate agreement consultations could be unlawful

By |June 30th, 2014|Healthcare, IT Management, IT Planning, Security|Comments Off on HIPAA business associate agreement consultations could be unlawful

Here is a controversial article written recently by Kevin McDonald for TechTarget. ------------------------------------------------------------------------------------------------------------------------------------- Under federal law, the Health Information Portability and Accountability Act (HIPAA) Privacy Rule extends to a class of business entities (i.e., health [...]

605, 2014

Is Antivirus Software Really Dead?

By |May 6th, 2014|IT Management, IT Planning, Security|Comments Off on Is Antivirus Software Really Dead?

I am curious what Dye’s definition is for "cyber-attack?" One this is for sure, the motivation of hackers and malware has changed dramatically over the years. The threats are new and different today. Going back in history most malware was related to someone wanting cyber fame, making a political statement or just plain mischievousness. Now with the advent of ransomware, spam mailing bots and

I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Hello