One small step for man, one giant leap for privacy!

“To err is human”… a pretty obvious statement. So if we all know we are going to make mistakes, why not add an extra level of security to mitigate the effects of the mistake? I am sure we have all been in the predicament of sending John C. an email, but when we clicked on our contacts list we accidentally sent it to John B. I have conversations constantly with clients and friends about encrypting their email to protect themselves and often get the same set of questions… “Isn’t that e ...

The IoT, Little “Things” with Big Implications

You may have experienced the first coordinated cyber attack using “Internet of Things”, IoT. I bet you are wondering how did it affect me? How did it happen?  Did you notice on October 21st that Facebook and LinkedIn were not available?  Maybe you noticed that Amazon couldn’t take your order, and email was really slow? This was the result of a DDoS attack, Distributed Denial of Service, which have been going on for years, but this one was different. Typically, DDoS attacks are the result of ...

HIPAA: Patient Access to Their Information

With all of the cyber-security breaches and fines levied on organizations for lost PHI, it's easy to forget that HIPAA also defines what information must be provided to the patient and transferred to other providers for care and when they change providers. HIPAA has three basic components: Portability - allow for the transfer of patient information to other providers that may provide care to the patient or to the patient themselves. Allow the patient to access their patient information defi ...

Value Proposition of HIPAA Compliance (1 of 2)

If you've been reading our blog very long you know we've discussed Is HIPAA worth it?, What's the ROI?, etc, etc.  This article is really another way to think about why you need to start working on your HIPAA compliance today. What is the Value Proposition of HIPAA Compliance? Identifies weaknesses that make your business vulnerable and liable Improves protection of your patients’ valuable PHI Protects your business from disruptive events – natural and man-made Fortifies your cyber ...

Third Rock Announces – Custom HIPAA Policies and Procedures

FOR IMMEDIATE RELEASE   Austin, TX, Aug 25, 2016 – Third Rock, provider of HIPAA Worry-Free Compliance™, announced custom, online HIPAA Policies and Procedures as an additional capability of  their compliance management platform, CompassDB™.  This new capability is designed to address common issues associated with policies and procedures found in most healthcare practices; outdated paper documents collecting dust on a bookshelf. The overarching focus of CompassDB™ is to reduce the cost ...

Third Rock Announces CompassDB™ – A Comprehensive Compliance Management Platform

Austin, TX, - Aug. 3, 2016 – Third Rock, provider of HIPAA Worry-Free Compliance™, announced CompassDB™ their compliance management platform.  CompassDB™ is designed to significantly reduce the cost and burden of HIPAA compliance for all parties involved.  Consulting firms who provide compliance services, and the clients, Covered Entities and Business Associates on which HIPAA regulations are focused, all will benefit. CompassDB™ is a cloud solution that provides safe, secure, web based s ...

Focus on Security: Printer Security

We all know we need to improve our computer and network security.  But we often forget that printers are now smart and connected.  Basically, they're another computer on the network. Therefore, we all need to take notice and insure we improve security on our printers.  The exact steps will vary depending on the brand, size, complexity, connection type and features of each printer.  But, below are several steps you can take to get started. Network - secure it Make sure you have a strong password on ...

Focus on Security: Microsoft sets security bulletin record

Microsoft had 135 security bulletins in 2015, which was a significant increase over previous years.  In fact it was over 25%.  What this means to you?  That Microsoft had to fix a lot of vulnerabilities in their software. Which meant someone found a way to break in to (breach) Microsoft Windows or Office or other Microsoft software.  What should you do? Make sure you have Microsoft updates turned on and all of your servers and workstations are up-to-date on software patches (updates). This includ ...

Focus on Security: It’s going to take more resources

No one wants to spend money for something they don't want or need.  Many companies, including the healthcare industry, try to squeeze IT when it comes to the budget.  But what most CFO's and executives that control the IT budget need to understand is, they have become a digital business, at least in the back office. Everything is now done on the computer.  Therefore, there must be an increase in resources to keep the computers up-to-date, secure and operating at acceptable levels. With cyber criminals ...

Your iPhone Is a Target for Criminals

Check Point Software released their April 2016 Threat Index revealing what we all know; cyber-threats are rising at alarming rates.  The report shows Apple's iOS devices are under heavier attack than reported in previous reports. Over 2,000 unique malware families were identified by Check Point during April, which they state is a 50 percent increase over March, and you thought rabbits multiplied rapidly!  The iOS issue comes from the fact they found XcodGhost had moved into the top three most common mobi ...

1 2 3 4