Quantcast
Channel: Inforistec Risk Management Blog
Browsing all 14 articles
Browse latest View live

Apps on the Cloud - I’m not so sure

Everywhere you turn you hear that Cloud is the platform of tomorrow and the future.  Vendors are touting their Cloud based solutions. IT Analysts continuously proclaim the great virtues of the Cloud....

View Article



Focus on the real threats

In order to maintain a secure organization, we know risk assessments must be completed to identify gaps and mitigate the associated risks. Add to that new threats that need to be addressed. Using the...

View Article

Cloud Risk Management:  a new audit challenge

Cloud computing has emerged based on the convergence of internet technologies, virtualization and IT standardization. Network based applications and data services, decoupled from enterprise data...

View Article

Security driven compliance: Drive value from the compliance process

Over the last several years, a number of new and increasingly stringent legal and regulatory requirements have been imposed.   Whether you need to comply with SOX, PCI, HIPAA, FISMA, GLBA or privacy...

View Article

HIPAA/HITECH: Are providers ready for the compliance challenge?

The first set of Medicare electronic health record (EHR) incentive payments were issued recently by the Centers for Medicare & Medicaid Services (CMS) as part of the Medicare and Medicaid EHR...

View Article


Social Computing: Unharnessed Power

What is the collective term to describe blogs, wikis, social media, instant messaging, and other collaborative and communication tools on the Internet? If you guessed “Social Computing”, you are...

View Article

Digital Healthcare: How can we secure it all?

Viewing one eight minute YouTube interview with Dr. Eric Topol, author of “The Creative Destruction of Medicine” is evidence enough that the sand beneath the healthcare world we grew up in, has...

View Article

Security driven compliance: Drive value from the compliance process

Over the last several years, a number of new and increasingly stringent legal and regulatory requirements have been imposed.   Whether you need to comply with SOX, PCI, HIPAA, FISMA, GLBA or privacy...

View Article


Social Computing: Unharnessed Power

What is the collective term to describe blogs, wikis, social media, instant messaging, and other collaborative and communication tools on the Internet? If you guessed “Social Computing”, you are...

View Article


Continuing the Discussion:  Moving Toward HIPAA Compliance

Previously, I discussed the inadequacy of answering ‘yes’ or ‘no’ to a checklist of HIPAA Privacy and Security requirements and assuming that simply finishing that task will provide your practice or...

View Article

Are Your Business Associates Putting You At Risk?

For your patients’ and your protection, you need a complete and accurate accounting of all businesses that are accessing, storing, or handling your patient health information (PHI) and...

View Article

Focus on the real threats

In order to maintain a secure organization, we know we need to complete a risk assessment, identify gaps and then mitigate the risks identified.  There are threats we need to address.   Some 21...

View Article

Heartbleed Vulnerability

By now you have probably heard, through news media, about a significant security issue that probably will affect you.  The name that has been given to it is "Heartbleed".  It is a vulnerability, not a...

View Article


Mental Health and Security Risks

Mental Health is an area of public health that definitely needs more attention and funding. At the recent mHealth 2013 conference multiple speakers at the mental health breakout session discussed key...

View Article
Browsing all 14 articles
Browse latest View live




Latest Images