Questions? Talk to a Real Person via our Live Chat
Physical Safeguards for HIPAA, Part 2: Workstation Use
By Gil Vidals, , HIPAA Blog

Physical Safeguards for HIPAA, Part 2: Workstation Use

In part 1 of this series, we learned that a laptop containing sensitive, protected health information (PHI) was stolen from the car of a West Virginia Health System employee. To make matters worse, the hard drive containing PHI was unencrypted, leaving the data open to access by unauthorized users. While unfortunate, the occurrence does serve to highlight... Continue reading
Physical Safeguards for HIPAA, Part 1:  Facility Access
By Gil Vidals, , HIPAA Blog

Physical Safeguards for HIPAA, Part 1: Facility Access

A recent, potential breach of protected health information (PHI) – including social security numbers, financial information, and medical data – was reported by a major health system in West Virginia. The cause? A stolen laptop, taken from an employee’s car. Despite equipping the laptop with security tools (including password protection), the health system failed to... Continue reading
OpenVAS – Open Vulnerability Assessment System
By Gil Vidals, , HIPAA Blog, Resources

OpenVAS – Open Vulnerability Assessment System

If you’re looking for an open-source software framework that is used for vulnerability scans and vulnerability management, the Open Vulnerability Assessment System (OpenVAS) is a first-rate tool. Developed by Greenbone Networks, OpenVAS is a framework of services and tools supported by an open-source community that promotes vulnerability analysis and management. OpenVAS can be downloaded as... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Top 3 Website Security Vulnerabilities

When performing a scan of your system servers, applications, and network devices, it’s not uncommon to see certain, predictable vulnerabilities showing up in the results. As each vulnerability represents a potential “weak spot,” or opening for attackers to penetrate and compromise your system, it’s important to be aware of them. The following represent the 3... Continue reading
Skip to content