HIMSS

The recent cyber attack on Anthem has vexed many victims and onlookers—and not just because Anthem had information on individuals who weren’t Anthem members. Many are asking why cyber attackers would want to steal healthcare records. Is information on someone’s health condition really that valuable? While some may not think so, as a victim of…

+ read more

Travis Greene
Aug 25, 2015
8:13 am
Reads:
2,592
Score:
Unrated

With the release of the 2015 Cyberthreat Defense Report last week this number nerd took some time to review and collate some of the IT Security statistics and numbers that have piqued his interest or curiosity over the last few months. From protecting user data against the growing number of threats to ensuring the continuity…

+ read more

David Shephard
Mar 16, 2015
1:51 pm
Reads:
40,491
Score:
4.75

This post reminds me of the very early days in my career as an application developer on a Medicare claims processing system. I took on the responsibility of a large subsystem implementation that year where I was responsible for the requirements definition, specification and subsequently the testing of the new subsystem, Medicare Secondary Payer (MSP). Why the…

+ read more

Jul 24, 2014
7:39 pm
Reads:
15,376
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow