Questions? Contact Us

 

Will the Password Ever Go Away?

We have a love/hate relationship with our passwords. We have to love them because they give us access to practically everything necessary in our home and work life – from banking and email accounts to Netflix and school activity accounts. The hate part comes in when we try to recall what password we created for each account – and there are many fro...
Continue reading
1028 Hits
0 Comments

A provider’s survival guide to HIPAA threat evaluation

Within the Health Insurance Portability and Accountability Act (HIPAA) are two fundamental rules that all covered entities (like health care providers) need to understand and follow.The HIPAA Privacy Rule applies to Protected Health Information (PHI) broadly, and falling under that is the HIPAA Security Rule which focuses on electronic Protected He...
Continue reading
894 Hits
0 Comments

For HIPAA controls, how O can you go?

There's devil in the details of the various controls organizations use to ensure compliance with the requirements of the Health Insurance Portability and Accountability Act (HIPAA). We highlighted them all in a recent blog post if you want to read more. Broken out as administrative, operational or technical, HIPAA controls refer to the various proc...
Continue reading
1224 Hits
0 Comments

What providers really need to know about HIPAA Title II

The massive Health Insurance Portability and Accountability Act (HIPAA) enacted by congress in 1996 is broken out into five different titles, with Title II being the one most heavily focused on security and privacy. Title II set, for the first time, key standards for electronic health care transactions and national identifiers for providers, health...
Continue reading
1469 Hits
0 Comments

The devil in the HIPAA controls details

When it comes to meeting the requirements of the Health Insurance Portability and Accountability Act (HIPAA), there are many potential controls that health care providers can implement to protect themselves against threats that could compromise sensitive data, like patients' electronic personal health records (PHR).Getting a handle on the controls ...
Continue reading
987 Hits
0 Comments

With enforcement on the rise, HIPAA audits take on new meaning

Given the new presidential administration and the unclear fate of the Affordable Care Act, some health care providers (covered entities) may be wondering if Health Insurance Portability and Accountability Act (HIPAA) privacy and security regulations might be falling by the wayside.Recent news suggests that HIPAA audits, which were originally design...
Continue reading
891 Hits
0 Comments

Vyatta border gateway passthrough filtering

It is generally a best practice to include multiple layers of security for any infrastructure.  Even if you are just routing packets, your routers are your outside perimeter and should include tools to restrict traffic not only to the device itself but also to the traffic that passes through. This doesn't mean the router should be your firewall, f...
Continue reading
1470 Hits
0 Comments

Zabbix & OSSEC: Open-Source compliance and security monitoring

Good security, not just compliance requirements, encourages IT & Security staff to spend time reviewing security events.  There are many tools available for many security components of your network; this article will focus on host security and host log monitoring using OSSEC and Zabbix. After having used many open and commercial  monitoring sy...
Continue reading
1361 Hits
0 Comments

Health Insurance Portability & Accountability Act (HIPPA), PCI, SOX and Web Hosting

"HIPAA" is an acronym for the Health Insurance Portability & Accountability Act of 1996 (August 21), Public Law 104-191, which amended the Internal Revenue Service Code of 1986. Also known as the Kennedy-Kassebaum Act, the Act includes a section, Title II, entitled Administrative Simplification, requiring: Improved efficiency in health care d...
Continue reading
1287 Hits
0 Comments