HIPAA

All of the ciphers listed are Forward Secrecy (FS) enabled and are highly recommended. They work with pretty much everything you could possibly run into at…

May 4, 2017
5:29 pm
Reads:
601
Score:
5

Last time we talked about HIPAA, we said it was time to start getting serious. A number of new rules have been implemented that have increased the level of enforcement faced by healthcare organizations. In 2009 the Health Information Technology for Economic and Clinical Health (HITECH) Act passed, which addressed the privacy and security concerns…

+ read more

Kent Purdy
Nov 21, 2016
2:26 pm
Reads:
1,410
Score:
Unrated

How is managing user access to IT resources like managing customer access to movies at a megaplex theater? Both megaplex managers and IT managers must weigh the cost of enforcing access rules. Megaplex rules generally prohibit theater hopping, the practice of paying to see one movie, then sampling other movies in the megaplex for free….

+ read more

Travis Greene
Apr 16, 2015
7:27 am
Reads:
1,948
Score:
Unrated

The signs are all there.  It’s time to get serious about complying with the Health Insurance Portability and Accountability Act (HIPAA) Security and Privacy Rules.  Are you compliant yet?  If not, the U.S. Department of Health Human Services (HHS) wants you to know that tolerance for noncompliance with HIPAA regulations is lower than ever before. …

+ read more

Kent Purdy
Jan 22, 2014
8:44 am
Reads:
57,275
Score:
Unrated

Like executives at other organizations, those in the healthcare industry know they need an efficient disaster recovery (DR) system. They know this—but do they actually have one? According to Bridgeway Security Solutions, only 26 percent have a “robust, tried-and-tested” DR system. On top of that, 67 percent of healthcare CIOs say they face IT staff…

+ read more

David Shephard
Aug 13, 2013
9:39 am
Reads:
2,700
Score:
5

I have spent the last couple of weeks working with one of our partners with regards to a solution encompassing of technology and services to meet the most immediate requirements for their healthcare customers.It also provided an opportunity to do a little research on our current healthcare customers and solutions that they subscribe to using…

+ read more

Jul 29, 2013
4:14 pm
Reads:
2,658
Score:
5

In the early days of cell phones, providers faced little competition, but as more providers came online, they began undercutting each other on price. We’ll soon see the same trends take hold in cloud services. Behemoths like AT&T have such massive data center infrastructure already in place they can easily blow away tier 2 players…

+ read more

RichardWhitehead
Apr 14, 2011
9:35 am
Reads:
2,258
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow