HIPAA

All of the ciphers listed are Forward Secrecy (FS) enabled and are highly recommended. They work with pretty much everything you could possibly run into at…

May 4, 2017
5:29 pm
Reads:
1,269
Score:
5

Last time we talked about HIPAA, we said it was time to start getting serious. A number of new rules have been implemented that have increased the level of enforcement faced by healthcare organizations. In 2009 the Health Information Technology for Economic and Clinical Health (HITECH) Act passed, which addressed the privacy and security concerns…

+ read more

Kent Purdy
Nov 21, 2016
2:26 pm
Reads:
1,814
Score:
Unrated

How is managing user access to IT resources like managing customer access to movies at a megaplex theater? Both megaplex managers and IT managers must weigh the cost of enforcing access rules. Megaplex rules generally prohibit theater hopping, the practice of paying to see one movie, then sampling other movies in the megaplex for free….

+ read more

Travis Greene
Apr 16, 2015
7:27 am
Reads:
2,124
Score:
Unrated

The signs are all there.  It’s time to get serious about complying with the Health Insurance Portability and Accountability Act (HIPAA) Security and Privacy Rules.  Are you compliant yet?  If not, the U.S. Department of Health Human Services (HHS) wants you to know that tolerance for noncompliance with HIPAA regulations is lower than ever before. …

+ read more

Kent Purdy
Jan 22, 2014
8:44 am
Reads:
57,562
Score:
Unrated

Like executives at other organizations, those in the healthcare industry know they need an efficient disaster recovery (DR) system. They know this—but do they actually have one? According to Bridgeway Security Solutions, only 26 percent have a “robust, tried-and-tested” DR system. On top of that, 67 percent of healthcare CIOs say they face IT staff…

+ read more

David Shephard
Aug 13, 2013
9:39 am
Reads:
2,880
Score:
5

I have spent the last couple of weeks working with one of our partners with regards to a solution encompassing of technology and services to meet the most immediate requirements for their healthcare customers.It also provided an opportunity to do a little research on our current healthcare customers and solutions that they subscribe to using…

+ read more

Jul 29, 2013
4:14 pm
Reads:
2,846
Score:
5

In the early days of cell phones, providers faced little competition, but as more providers came online, they began undercutting each other on price. We’ll soon see the same trends take hold in cloud services. Behemoths like AT&T have such massive data center infrastructure already in place they can easily blow away tier 2 players…

+ read more

RichardWhitehead
Apr 14, 2011
9:35 am
Reads:
2,387
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow