Back in early April of this year (2014) there was a new security vulnerability discovered known as the “Heartbleed Bug.” This software bug has had an impact on the overall global internet community which uses Secure Socket Layer (SSL) certificates to provide secure websites to the public. As a result, this security issue has had... Continue reading
In order to host and/or migrate medical data being transferred from the European Union (EU), US hosting providers have to undergo and partake in the U.S.-EU Safe Harbor certification process. EU Directive 95/46/EC is the European Union mandate (in conjunction with the European Convention {EC}) for the protection of individuals with regard to Automatic Processing... Continue reading
If you host a website that will interact with patient information, then you should find a HIPAA specialist in web hosting. Patient information is considered Protected Health Information (PHI) or Electronic Health Records (EHR) and is protected by the regulations of the Health Insurance Portability and Accountability Act (HIPAA).
When looking for a HIPAA Compliant Host, it is important that you find one that will integrate well with (and essentially be an extension of) your team. The hosting provider will know your objectives clearly and will strive to meet them. In contrast, a non-HIPAA compliant host generally only cares that the network is up... Continue reading
Regulatory Compliance | Risk Assessment | Information Assurance | Password Management When providing services to HIPAA clients, guidelines have to be followed and rules put into place; this requires someone that can manage these restrictive measures and become intimately familiar with the processes involved. Professionals who have obtained the CISSP credentials possess this knowledge, with... Continue reading
Malicious actors want your data, and will actively scan networks in order to discover vulnerabilities. Once they know your network’s weaknesses, they attempt to penetrate the network and gain unauthorized access in order to abuse the system in some way. Abuse may include stealing your data or using the compromised system as part of their... Continue reading