Keep your Healthcare business Secure and Healthy!
In this white paper we’ll bring you fully up to speed on exactly what the implications of HIPAA & HITECH regulations are and what it means for your business.
In this white paper we’ll bring you fully up to speed on exactly what the implications of HIPAA & HITECH regulations are and what it means for your business.
In this whitepaper we will discuss our effort to deploy a secure SaaS. Cloud infrastructure has indeed been a very attractive proposition to many enterprises, small or large, from the features that cloud infrastructure providers offer today. But cloud security is sometimes raised as a matter of concern. Therefore, when Aegify took its information security…
The health insurer Anthem Inc., which manages Blue Cross plans across a dozen states, recently announced that a hacking incident has compromised a database containing personal information of nearly 80 million individuals worldwide. Anthem believes that the unencrypted compromised information could include current and former members? and employees? names, birthdates, medical IDs/Social Security Numbers, Street…
The news of massive data breach at Anthem Inc., acts as a warning signal for enterprises across the globe irrespective of the industry type. The reports showcase that the Health Insurer, Anthem Inc., suffered this massive data breach as hackers gained access to their corporate data base. For this globally widespread enterprise with a client…
The increasing number of data breaches from cyber criminals across various enterprises have brought in large scale loss of personal information besides financial losses and brand erosion. Even as technological growth helped governments across nations improve their communication and governance levels multi-fold, the cyber security breaches have pressurized them to work on security policy changes.…
A new found vulnerability known as GHOST (CVE-2015-0235) affects many systems built on Linux starting with glibc-2.2 as well as Debian 7 (wheezy), Red Hat Enterprise Linux 6 & 7, CentOS 6 & 7 and Ubuntu 12.04, and allows attackers to remotely take control of an entire system without having any prior knowledge of system credentials. The…
For the technology dependent business world, the use of digital data has not only enabled ease of data transfers, storage and data accessibility from any location and device, but has also made them vulnerable to data breaches. Following the legal dispute between Texas Health and Human services Commission and its former contractor Xerox, the state…
The modern enterprises with their digital presence handle a variety of digital data from structured data, textual data such as reports, contracts and emails besides technical drawings, and multimedia. The most dangerous threats faced by them today are therefore the leakage of confidential data. Defined as an unauthorized transfer of sensitive data from an organization…
Bad enough that robbers were stealing a laptop and a cell phone from a physician, but in a unique incident, the assailants forced the physician to disclose the password and encryption keys to the encrypted data in the laptop. Even as enterprises work their way to protect their data from cyber criminals, unique incidents such…
Reports healthcare data breaches have reached a near 138%. The Department of Health and Human Services’ Office for Civil Rights therefore unveils its second round of audit program. Unlike the previous ones, this time the OCR is looking to conduct audits across all high-risk areas. While this eliminates on-site visits, they are looking towards potentially…