
Hippogriffs and HIPAA: Securing Data in Healthcare Applications
One of the best parts of science fiction and fantasy stories is the travel. When you climb into the Millenium Falcon, a retrofitted Delorean, or even on a flying “hippogriff” in Harry Potter, you can’t help but wonder, What will travel be like in the future? (Ok, the hippogriff might be a stretch). Yet for... Continue reading
Password Management: 5 Best Practices for Compliant Environments
Good security habits can sometimes feel like extra work – like when you have to jump out of bed to ensure your doors are locked, two seconds after you’ve clicked off the light. Why do you do it? Because you know the little extra effort isn’t too high a price for keeping an intruder out,... Continue reading
How it Happened – The Critical Evidence of HIPAA Logs
If you’re like me, you’ve watched more than a few “Cold Case” or “How it Happened” re-enactments in your time. If you’re my wife, you’ve watched a whole lot more. In either case, you’ll recall that dramatic moment when the determined investigators march into the evidence room and pull the dust-covered, archived box of case... Continue reading
Snapshots and Business Continuity
The third in our series on business continuity for healthcare. by Stephen Trout On the old adage, “a picture is worth a thousand words,” there seems to be a thousand variations on a theme. Take the Russian writer, Ivan Turgenev: “The drawing shows me at one glance what might be spread over ten pages in... Continue reading