HIPAA, Health Technology Trends, and Security Threats

Most people in the U.S. say that care more about protecting the privacy of their healthcare data than they do about being able to conveniently access that information. That said, according to a recent PwC Health Research Institute report, privacy will be sacrificed to apps/services that collect and analyze personal health information. Do-it-yourself healthcare is… Continue reading HIPAA, Health Technology Trends, and Security Threats

Get Ready Now for 2015 HIPAA Audits

A random audit program to gauge HIPAA compliance is expected to commence in early 2015. This round will include both on-site and off-site reviews. Your New Year will be happier if you start getting audit-ready now. We have provided you with tips below to make the process easier. Off-Site Audits Off-site audits focus on documentation… Continue reading Get Ready Now for 2015 HIPAA Audits

Top Cyber Security Threats and Trends for 2015

Predicting the future is easy – take a long look at what’s happening now and hit the mental fast forward button. But in 2015 the rewind button will be equally useful. We don’t have a fail-proof crystal ball but we suspect that old-school style hacktivisim will share the headlines with emerging threats against devices and… Continue reading Top Cyber Security Threats and Trends for 2015

Financial Industry IT Security 2015 To-Do List

The forthcoming cybersecurity guidance from the Federal Financial Institutions Examination Council is expected to focus on people and processes that defend against specific types of threats, Future IT examinations for all sizes of banking institutions will include reviews of employee awareness of security threats, the depth and breadth of an institution’s training programs, patching policies,… Continue reading Financial Industry IT Security 2015 To-Do List

Protecting Electronic Healthcare Data: The New Realitiesta

Almost half of all identity thefts in the U.S. are now stolen medical records, as reported by USA Today. While breaches of credit card data may grab the headlines (like last year’s fiasco at Target stores), a stolen credit card number usually reflects fraud quickly and can be cancelled rapidly. By contrast, a single patient’s… Continue reading Protecting Electronic Healthcare Data: The New Realitiesta

October is Cyber Security Month – Check out our Daily Tips

          October 1, 2014 Links Can Be Misleading. Before Clicking On a Link, Take Another Look. Don’t just click on links that you have received through email or instant messenger. Even if the link text looks like a URL, the link could be going somewhere else. Instead, move your mouse pointer… Continue reading October is Cyber Security Month – Check out our Daily Tips

Target Corp Data Breach Issue May Be Spreading…

One of the largest retail hacks in the United States, the breach on Target caught the attention of the world. The event itself proved how common these types of attacks are no matter the size of an organization. Just recently, the restaurant chain P.F. Chang’s China Bistro found themselves in a similar position as Target.… Continue reading Target Corp Data Breach Issue May Be Spreading…

Data Breaches from Malware are Inevitable and Could Cost $500 Billion in 2014

The cost of a data breach or malware infection extends well beyond the dollars spent on responding and addressing security issues — productivity takes a big hit as enterprises and consumers spend countless hours dealing with the threats, according to a study from IDC in March, 2014.  That is to say nothing about the financial… Continue reading Data Breaches from Malware are Inevitable and Could Cost $500 Billion in 2014

Microsoft IE Zero-day Vulnerability (CVE-2014-1776)

THREAT OVERVIEW:  On April 26th 2014, Microsoft released a security advisory (2963983) for a zero-day vulnerability in Internet Explorer (CVE-2014-1776).  Exploitation of the vulnerability is reportedly being used in limited, targeted attacks.  The vulnerability exists in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11. … Continue reading Microsoft IE Zero-day Vulnerability (CVE-2014-1776)

The Next Big Advance in Breach Detection & Prevention

Sears Holdings Corp. announced in March of this year (2014), it was investigating a possible security breach after a series of cyberattacks on other retailers have exposed the data of millions of consumers. The security review was still at an early stage as Verizon Communications Inc. (VZ)’s digital forensics unit and the U.S. Secret Service… Continue reading The Next Big Advance in Breach Detection & Prevention