Apps on the Cloud - I’m not so sure
Everywhere you turn you hear that Cloud is the platform of tomorrow and the future. Vendors are touting their Cloud based solutions. IT Analysts continuously proclaim the great virtues of the Cloud....
View ArticleFocus on the real threats
In order to maintain a secure organization, we know risk assessments must be completed to identify gaps and mitigate the associated risks. Add to that new threats that need to be addressed. Using the...
View ArticleCloud Risk Management: a new audit challenge
Cloud computing has emerged based on the convergence of internet technologies, virtualization and IT standardization. Network based applications and data services, decoupled from enterprise data...
View ArticleSecurity driven compliance: Drive value from the compliance process
Over the last several years, a number of new and increasingly stringent legal and regulatory requirements have been imposed. Whether you need to comply with SOX, PCI, HIPAA, FISMA, GLBA or privacy...
View ArticleHIPAA/HITECH: Are providers ready for the compliance challenge?
The first set of Medicare electronic health record (EHR) incentive payments were issued recently by the Centers for Medicare & Medicaid Services (CMS) as part of the Medicare and Medicaid EHR...
View ArticleSocial Computing: Unharnessed Power
What is the collective term to describe blogs, wikis, social media, instant messaging, and other collaborative and communication tools on the Internet? If you guessed “Social Computing”, you are...
View ArticleDigital Healthcare: How can we secure it all?
Viewing one eight minute YouTube interview with Dr. Eric Topol, author of “The Creative Destruction of Medicine” is evidence enough that the sand beneath the healthcare world we grew up in, has...
View ArticleSecurity driven compliance: Drive value from the compliance process
Over the last several years, a number of new and increasingly stringent legal and regulatory requirements have been imposed. Whether you need to comply with SOX, PCI, HIPAA, FISMA, GLBA or privacy...
View ArticleSocial Computing: Unharnessed Power
What is the collective term to describe blogs, wikis, social media, instant messaging, and other collaborative and communication tools on the Internet? If you guessed “Social Computing”, you are...
View ArticleContinuing the Discussion: Moving Toward HIPAA Compliance
Previously, I discussed the inadequacy of answering ‘yes’ or ‘no’ to a checklist of HIPAA Privacy and Security requirements and assuming that simply finishing that task will provide your practice or...
View ArticleAre Your Business Associates Putting You At Risk?
For your patients’ and your protection, you need a complete and accurate accounting of all businesses that are accessing, storing, or handling your patient health information (PHI) and...
View ArticleFocus on the real threats
In order to maintain a secure organization, we know we need to complete a risk assessment, identify gaps and then mitigate the risks identified. There are threats we need to address. Some 21...
View ArticleHeartbleed Vulnerability
By now you have probably heard, through news media, about a significant security issue that probably will affect you. The name that has been given to it is "Heartbleed". It is a vulnerability, not a...
View ArticleMental Health and Security Risks
Mental Health is an area of public health that definitely needs more attention and funding. At the recent mHealth 2013 conference multiple speakers at the mental health breakout session discussed key...
View Article
More Pages to Explore .....