In the popular TV series: "8 Simple Rules for Dating My Teenage Daughter," the rules may have been a bit exaggerated but they sure made their point. (Rule #1: Use your hands on my daughter and you'll lose them after).…
HITECH and the notice of proposed rule making (NPRM) published in the Federal Register July 14, 2010 significantly impact how Covered Entities (CEs) and Business Associates (BAs) manage health IT security risk under HIPAA.
Just hacked a box on a penetration test but can't get a Meterpreter shell on it for some reason? Follow these steps!
Some very interesting findings in the new health care security report form Deloitte.
HHS OCR has really taken its new role granted by HITECH seriously because they are seeking to tighten regulations and increase financial penalties.
Since the Breach Report 2010 portable media is trending as one of the easiest ways find yourself in a data breach scenario.
When discussing cloud security it is important to remember that there is no such thing as perfect security. Not in your data center. Not in the cloud.
It is not unusual to have hundreds of Business Associates who have access to ePHI, this creates risk that needs to be accounted for.
Breach Report 2010 documents the major happenings in PHI breaches over the last year.
Actual security vs. advertised state of security- whats the difference? Apparently enough to get breached.