Is it Time to Outsource Your Computer Support? Many businesses are beginning to reach that conclusion. “prevention is better than cure” -Erasmus Setting up a small business computer network used to be a relatively simple affair. A small business owner merely needed a few computers, an internet […]
Read more →Reports of HIPAA breach incidents are nothing new. HIPAA (Health Insurance Portability and Accountability Act) stipulates that healthcare providers, insurance companies, and those who serve them (also known as “Business Associates”) take extensive measures to protect the Protected Health Information (PHI) of their patients. Even the dearly […]
Read more →It has been said that the most difficult interface to secure is the one between the chair and the keyboard. This bit of “nerd humor” actually has its basis in fact. Art Gross has written a very informative post titled “Your employees will cause your next HIPAA […]
Read more →According to the LA Times, five workers and a student research assistant were fired in the wake of a patient privacy breach affecting the patient medical records of 14 patients. According to a statement released by Cedars-Sinai Medical Center, the 14 patient records were “inappropriately accessed” between […]
Read more →The US Department of Health and Human Services (HHS) announced last week that the managed care company WellPoint, Inc. had agreed to pay a fine of $1.7 million to settle potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) privacy and security rules. […]
Read more →Skipped HIPAA Security Risk Analysis costs ISU $400,000 IT consultants and Managed IT service providers have been warning their clients that the HIPAA Security Risk Analysis is a very necessary component in their efforts to comply with the HIPAA rule. Some of our medical clients and prospects […]
Read more →Thom Infotech is pleased to announce our new RescueSMB Backup and Disaster Recovery program. This solution brings enterprise-class business continuity capabilities to the Small to Medium Business (SMB) community in an affordable and convenient package. RescueSMB boasts the following features: Frequent Backups – As often as every […]
Read more →Keeping your business afloat after a disaster As the owner of a technology consulting firm, I’m occasionally asked to assist with Business Continuity Planning (BCP). As the name implies, BCP is a discipline that attempts to answer the “what if” questions that surround the viability of a […]
Read more →Facebook has confirmed that they were a victim of a targeted attack that leveraged a previously unknown Java vulnerability. The zero-day exploit was used to infect the laptops of several engineers with malware that apparently was used to attempt a full-scale infiltration of the inner sanctum of […]
Read more →Today, a Security Bulletin (APSB13-04) has been posted to address security issues in Adobe Flash Player 11.5.502.146 and earlier versions for Windows and Macintosh, Adobe Flash Player 11.2.202.261 and earlier versions for Linux, Adobe Flash Player 11.1.115.36 and earlier versions for Android 4.x, and Adobe Flash Player […]
Read more →