View Post

Five IT Security Claims You Can Quit Believing

In Security by Shelly KramerLeave a Comment

According to the latest annual PwC survey of the Global State of Information Security, the number of cyber security incidents detected is rising sharply, while the amount spent on security has been falling. Given the extremely high cost of a cyberattack to a businesses’ reputation and day-to-day operations, it’s a bit of an understatement to say this might be considered …

View Post

How to Master HIPAA Compliance and Security in the Cloud

In Security by Shelly Kramer1 Comment

In a world of tight healthcare budgets and increasing pressure to implement new technology, many healthcare CIOs are looking to the cloud for solutions. The flexibility and potential cost savings that cloud services can offer are obvious benefits to healthcare executives facing ever-higher costs to collect, collate, and store vast amounts of digital data. But, we’re talking healthcare here. The …

Enterprise IT Reality: Cyberthreats and Security Fears

In Security by Shelly KramerLeave a Comment

Today’s enterprise IT teams are largely kept awake at night focused on cyberthreats and security fears. That’s very different, though, than what tech teams have focused on in the past. Consider this: In November 1988, the world was introduced to the first widespread computer bug. The virus caused thousands of machines to crash and resulted in damage that was well …

View Post

Four Steps to Protecting Your Utility Management System from Hackers

In Security by Shelly Kramer1 Comment

Every day it seems as though there’s another hacking story in the news, the most recent of which is yet another hacking by the Chinese of the federal government’s databases, this time gaining access to personal information on some four million current and former federal employees. Troubling, to be sure. More troubling if you happen to be an IT pro …

Managing the Data Security Risks of Patient Portals

In Security by Shelly Kramer1 Comment

The rapid advances of technology are affecting all areas of our lives, and in the process is throwing up new, and often unexpected challenges to our privacy, especially the security of our personal information. This is notable in the intimate realm of our health, as well as our relationships with our medical practitioners and providers. As the use of electronic …

What Is Next For Consumer Privacy As Data Continues To Proliferate

In Security by Daniel Newman1 Comment

We are inherently drawn towards things that are free. Psychologist, Dan Ariely, in his book, Predictably Irrational: The Hidden Forces That Shape Our Decisions, has explained this behavior, “FREE! gives us such an emotional charge that we perceive what is being offered as immensely more valuable than it really is.” With the rise in consumerism, our needs, wants, and demands …

Patient Privacy & Data Security: Utilizing IT Vendors To Meet HIPAA Compliance & Avoid Risks

In Security by Eric Vidal

Many Covered Entities don’t have the budget needed for the equipment, systems, technology, personnel, and other overhead costs associated with maintaining an on-site data center. The high cost of a HIPAA violation — whether it has financial or legal implications — simply isn’t worth it. Outsourcing data management to a third-party data center partner should simply be a top priority …

Top 10 Critical Questions to Ask Your Colocation Provider

In Security by Eric Vidal

Whether you’re moving your IT infrastructure to a colocation provider for the first time or looking to switch to a new provider, finding the right partner to keep your operations running 24/7/365 is a critical piece of the puzzle. Working with a colocation partner can lower operational and personnel costs, increase reliability, boost performance and re- directing resources. Download this …