In the popular TV series: "8 Simple Rules for Dating My Teenage Daughter," the rules may have been a bit exaggerated but they sure made their point. (Rule #1: Use your hands on my daughter and you'll lose them after).…
Some very interesting findings in the new health care security report form Deloitte.
HHS OCR has really taken its new role granted by HITECH seriously because they are seeking to tighten regulations and increase financial penalties.
Since the Breach Report 2010 portable media is trending as one of the easiest ways find yourself in a data breach scenario.
When discussing cloud security it is important to remember that there is no such thing as perfect security. Not in your data center. Not in the cloud.
It is not unusual to have hundreds of Business Associates who have access to ePHI, this creates risk that needs to be accounted for.
Breach Report 2010 documents the major happenings in PHI breaches over the last year.
Actual security vs. advertised state of security- whats the difference? Apparently enough to get breached.
Nasdaq has acknowledged that suspicious files were found on some of its systems. The files were apparently a result of hackers gaining access to at least one of their servers.
Also known as the LanMan, or LAN Manager hash, it is enabled by default on all Windows client and server versions up to Windows Server 2008 where it was finally turned off by default.