
Why your forms must be HIPAA Compliant
Anyone who handles medical information has probably heard the horror stories about what happens when protected health data falls into the wrong hands. There is, for instance, the $16 million settlement that health insurance giant Anthem is paying in response to the largest U.S. health data breach in history. In that case, hackers sent spear-phishing... Continue reading
Are Windows Server Platforms HIPAA Compliant?
Mission-critical servers are valued for their longevity, and Windows is no exception. As a closed-source technology, Windows Server platforms typically have a long life-cycle, in part, because the training and manuals for the tools are proprietary, just like the software. But similar to the Windows desktop distributions (XP, Vista, 7, 8,8.1, & 10), the Windows... Continue reading
Charity and Security Begin at Home
It’s a debated idea in our national discourse lately, and believe it or not, there’s a parallel to cybersecurity. The charity debate (as we’ll call it) comes as a question of priorities; should we only look after ourselves and our own, and let it end there? With no political agenda here, we can say that If one truly understands charity... Continue reading
Why Establish a Security Culture
Five “Security Culture” Markers to Aim for in your Organization: Cybersecurity is a top-down, strategic part of the company’s vision –Security is linked to business goals and relevant to board-level decisions You’ve determined a “data blueprint” of how data is used –Your team understands the context in which the data is created and used, and... Continue reading