Opportunities abound for providing HIPAA compliance services

As many security solution providers struggle to find compliance opportunities, there is a great opportunity in supporting compliance with the Health Insurance Portability and Accountability Act (HIPAA).Even though the comprehensive laws intended to protect patient and health care data are [...]

2014-04-11T17:48:00-07:00April 11th, 2014|

HIPAA security checklist: 10 services your customers need

Recent changes to HIPAA and HITECH opened up significant new opportunities for security solution providers who can shoulder the risks and get themselves educated on these regulations. As this HIPAA security checklist of services, below, shows, there are 10 specific [...]

2020-04-29T22:42:23-07:00April 9th, 2014|

HIPAA-compliant cloud storage services: Due diligence is key to survival

Many VARs are looking to profit from health care-related cloud storage services. But with profit comes responsibility. Whether you build your own or offer another’s service, the U.S. Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for [...]

2020-04-29T22:38:59-07:00April 8th, 2014|

The HIPAAcrisy of Healthcare.gov

Kathleen Sebelius at a House Energy and Commerce Committee hearing Wednesday said she is responsible for the problems with Healthcare.gov.  Will she extend her ownership to the violations of privacy regulations? Will she own the pathetic demonstration that political expediency means more to HHS than the commitment to applicants’ privacy?  Will HHS be a little more forgiving the next time another organization gets investigated for a HIPAA breach or will Tavenner and Sebelius be HIPAAcritical?

2019-04-09T00:25:08-07:00November 19th, 2013|

Internet Security Threat Report 2013

Creating successful targeted attacks requires attackers to learn about us. They will research our email addresses, our job, our professional interests, and even the conferences we attend and the websites we frequent. All of this information is compiled to launch a successful targeted attack. Once on our devices, the attacker’s tools are designed to pull as much data as possible. Undiscovered targeted attacks can collect years of our email, files, and contact information.

2023-08-10T23:39:28-07:00August 16th, 2013|

Who Is Stealing Your Company Assets?

Dave Cunningham, our Business Technology Officer, has been doing some research on e-mail security and privacy for company executives.  In doing that research, he came across an interesting article on a survey that points out that one in three IT [...]

2013-05-24T17:07:18-07:00May 24th, 2013|

Ransomware Gangs Are Now Stealing Passwords

A few months back I wrote a blog called, Don’t Get Caught by a Ransomware Gang.   The blog warned that ransomware gangs are loading malware onto computers.  Back then the threat was in the form of unwanted encryption of your [...]

2018-08-22T11:24:07-07:00May 20th, 2013|

Is Cloud Computing a Bunch of Hype?

If you read all the press releases from many of the new vendors then the answer is yes, there is much hype surrounding the “cloud”. If you read the results from the latest Tech Target Cloud Adoption Index you would [...]

2023-08-10T23:43:53-07:00May 10th, 2013|