Why Healthcare Entities Should Invest in Robust Cybersecurity

Healthcare organizations are under attack from all sides of their businesses. We are seeing a major increase in directed ransomware and other cyber-attacks on a variety of healthcare organizations and their partners. These attacks are crippling operations, while also [...]

Why Healthcare Entities Should Invest in Robust Cybersecurity2023-01-12T20:03:08-08:00

Why Ransomware Targets Education and Healthcare Sectors

Nowadays, tech and ransomware go hand in hand. Hackers look for two characteristics when they scope out their next target: first, an organization or individual with valuable information and assets; and second, someone who is fairly easy to attack. [...]

Why Ransomware Targets Education and Healthcare Sectors2022-12-16T17:41:34-08:00

Cybercrime: Non-Personal and Potentially Deadly

Written by Oli Thordarson, President/CEO of Alvaka Networks Mimi Grant, President of ABL Organization, wrote to me asking if a recent Red Cross plea to cyber-criminals to not attack hospitals with ransomware and extortion will help reduce cybercrime activity. [...]

Cybercrime: Non-Personal and Potentially Deadly2021-01-27T15:54:33-08:00

How is the New Apple iWatch just like the IBM PC?

If the IBM PC legitimized the PC market in 1981 and launched an explosion of sales and it created a whole new market, I predict the health-enabled Apple Watch will do the same.  Prior to IBM's entry into the PC [...]

How is the New Apple iWatch just like the IBM PC?2014-09-10T21:53:19-07:00

Unclear HIPAA rules permit healthcare data offshoring … for now

...Under the Final Rule, the OCR has the power to domestically deal out civil penalties, corrective actions and long-term monitoring, while the DOJ has the power to domestically deliver a criminal prosecution. Through enforcement under HITECH, the State attorneys general [...]

Unclear HIPAA rules permit healthcare data offshoring … for now2014-07-29T02:19:34-07:00

HIPAA business associate agreement consultations could be unlawful

Here is a controversial article written recently by Kevin McDonald for TechTarget. ------------------------------------------------------------------------------------------------------------------------------------- Under federal law, the Health Information Portability and Accountability Act (HIPAA) Privacy Rule extends to a class of business entities (i.e., health plans, health care clearinghouses and [...]

HIPAA business associate agreement consultations could be unlawful2020-04-29T22:44:01-07:00

Opportunities abound for providing HIPAA compliance services

As many security solution providers struggle to find compliance opportunities, there is a great opportunity in supporting compliance with the Health Insurance Portability and Accountability Act (HIPAA).Even though the comprehensive laws intended to protect patient and health care data are [...]

Opportunities abound for providing HIPAA compliance services2014-04-11T17:48:00-07:00

HIPAA security checklist: 10 services your customers need

Recent changes to HIPAA and HITECH opened up significant new opportunities for security solution providers who can shoulder the risks and get themselves educated on these regulations. As this HIPAA security checklist of services, below, shows, there are 10 specific [...]

HIPAA security checklist: 10 services your customers need2020-04-29T22:42:23-07:00

HIPAA-compliant cloud storage services: Due diligence is key to survival

Many VARs are looking to profit from health care-related cloud storage services. But with profit comes responsibility. Whether you build your own or offer another’s service, the U.S. Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for [...]

HIPAA-compliant cloud storage services: Due diligence is key to survival2020-04-29T22:38:59-07:00

Exploring the risky business of cyber insurance and IT services contracts

In my time as a security consultant and managed services provider, I've seen some questionable behavior and attitudes. Prime among them is the common belief in the business community that indemnity offered by cyber insurance and contracts replaces prudent actions [...]

Exploring the risky business of cyber insurance and IT services contracts2020-04-29T22:43:11-07:00