Covered entities and eligible providers must now address the issue of encryption of “data at rest” as part of their security risk analysis process. This shines a spotlight on the existing encryption references within the HIPAA Security Rule. Encryption of ePHI is specifically covered under 45 CFR 164.312(a)(2)(iv) which reads; "Implement a mechanism to encrypt and decrypt electronic protected health information.” However, since it is categorized as an “addressable control,” it is not specifically mandated.
I remember back in the day when I was reading ‘The Art of Deception’ by Kevin Mitnick in which he said “ …the social engineer is able to take advantage of people to obtain information with or without the use of technology”. We all know the reasons as to why someone would want to social engineer their way into a company-cause its easier than breaking into a firewall or VPN to gain access into the company’s internal network.
Many of my clients often ask me how a social engineer can do this? Well, Cisco recently came out with a security report with the above chart explaining the human weaknesses that social engineers are most likely to take advantage of. I especially liked this slide considering I myself used many of these weaknesses in many of my security assessment engagements as a social engineer. I also think that considering its an easy way to get into a company we are going to have to deal with it for a long time.