Questions? Talk to a Real Person via our Live Chat
By Gil Vidals, , HIPAA Blog, Resources

WordPress Websites Infected with Keylogger

On January 29, 2018, the widely used website content management system (CMS), WordPress, was once again infected with malware. To date, approximately 2000+ websites running the open-source CMS have become victims of a cryptocurrency keylogger. Coinhive is a JavaScript Monero Blockchain miner service that mines digital cryptocurrency. Coinhive runs a snippet of JavaScript code in... Continue reading
By Gil Vidals, , HIPAA Blog

Facebook’s New VPN

When Israeli-based Onavo came under the ownership of Facebook in 2013, the move was touted as providing a boost to CEO Mark Zuckerberg’s Internet.org initiative to “help bring web access to the world’s underserved communities.” The mobile analytics company would essentially provide Facebook users with a VPN, or Virtual Private Network, a secure connection to... Continue reading
By Gil Vidals, , HIPAA Blog

How to Tell if You Were Sent a Phishing Email

Millions of people wake up every morning, turn off their alarms, and immediately check social media, emails, or any application on their mobile devices. This has grown to be a regular routine for many. A growing number of hackers are taking advantage of these multitudes – most of whom are still half asleep – by... Continue reading
Managed Security Services – Can you afford NOT to have them?
By Gil Vidals, , HIPAA Blog, Resources, Security

Managed Security Services – Can you afford NOT to have them?

Network uptime – your patients depend on it. As cloud-based technology increasingly becomes the preferred means by which companies conduct business, not having the right services in place to protect against unexpected downtimes – whether from hardware/software failures or security compromises – can spell disaster. As the recent Amazon S3 outage proves, catastrophic infrastructure failures... Continue reading
By Gil Vidals, , HIPAA Blog

Malware Threatening Healthcare Organizations

  Clear Procedures are Needed to Protect against Malicious software. That’s a start. Here’s what you also need: Trained users of (the latest) malicious software protection tools, who’ve become skilled in the discovery and reporting of such detections. Limited access to ePHI through controls, allowing only the persons or software programs that require access, and... Continue reading
By Gil Vidals, , HIPAA Blog

Is Windows RDP HIPAA Compliant and Secure?

One of the great blessings of technology has been an unprecedented ability to work remotely, and connect with teams and customers on a global scale. But for remote workers involved in the transfer of sensitive data and protected health information, particularly those that have business agreements in place to maintain HIPAA compliance, adhering to standards... Continue reading
Skip to content