Yahoo email has experienced yet another security breach by hackers. Should you be worried about this? Even if you do not currently have a Yahoo email address, it is my opinion that you still need to be concerned.
Topics: breach, Business, cardholder data environment, chicago computer support, chicago IT support, Chicago PC Support, Disaster Recovery, ePHI, exploit, hacker, Healthcare IT, Hipaa, Hippa, infection, malware, security, threat, vulnerability
Is it Time to Outsource Your Computer Support? Many businesses are beginning to reach that conclusion.
"prevention is better than cure"
Setting up a small business computer network used to be a relatively simple affair. A small business owner merely needed a few computers, an internet connection with a cable or DSL modem, some cable connections, and the job was essentially done. The situation has changed dramatically in recent years, with proliferation of threats such as:
- Password stealing Trojans
- Spearfishing attacks
Topics: 0-day, antivirus, breach, business continuity planning, cardholder data environment, catastrophic data loss, chicago computer support, chicago IT support, Chicago PC Support, Disaster Recovery, exploit, hacker, Healthcare IT, Hipaa, Hippa, malware, medical, patch, PCI, PHI, privacy, Security, virus, viruses, vulnerability, zero-day, natural disaster
As of this writing there are roughly four useble business weeks left in the current year. As 2013 winds down, businesses should consider performing needed upgrades sooner rather than later. At the risk of creating a lengthy blog post I'm planning to provide 179 reasons to upgrade before January 2014.
Topics: business continuity, Business Continuity, chicago computer support, chicago IT support, Chicago PC Support, exploit, firewall, Healthcare IT, Hipaa, Hippa, homeland security, internet, internet explorer, java, malware, microsoft, patch, Section 179, security, Security, software, update, virus, viruses, vulnerability, zero-day
Reports of HIPAA breach incidents are nothing new. HIPAA (Health Insurance Portability and Accountability Act) stipulates that healthcare providers, insurance companies, and those who serve them (also known as "Business Associates") take extensive measures to protect the Protected Health Information (PHI) of their patients. Even the dearly departed are protected from such disclosures. For this reason, the United Stated Department of Health and Human Services (HHS) requires that providers report data breaches that reach a certain threshold. Though disturbing, this is nothing new.
It's the second Tuesday of the month, so that means it's Patch Tuesday. Microsoft will begin rolling out patches as the day progresses. This means your computer will likely reboot overnight. Here's a rundown of the patches you can expect.
It has been said that the most difficult interface to secure is the one between the chair and the keyboard. This bit of "nerd humor" actually has its basis in fact. Art Gross has written a very informative post titled "Your employees will cause your next HIPAA breach" concerning the most common cause of HIPAA breaches - your employees. Gross cites two recent examples where Protected Health Information (PHI) was leaked from the secured healthcare data environment by careless or poorly trained employees:
According to the LA Times, five workers and a student research assistant were fired in the wake of a patient privacy breach affecting the patient medical records of 14 patients.
The US Department of Health and Human Services (HHS) announced last week that the managed care company WellPoint, Inc. had agreed to pay a fine of $1.7 million to settle potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) privacy and security rules.
As the owner of a technology consulting firm, I'm occasionally asked to assist with Business Continuity Planning (BCP). As the name implies, BCP is a discipline that attempts to answer the "what if" questions that surround the viability of a business when faced with a disruptive event such as a fire, flood, hurricane, tornado, theft, riot, or any number of contingencies that could interfere with the normal course of business. BCP is meant to plan for such a disruption, giving the business a fighting chance to stay afloat and serve their customers until returning to business-as-usual at some point in the future.
Topics: bcp, business continuity, Business Continuity, business continuity planning, chicago computer support, chicago IT support, disaster, disaster preparedness, Healthcare IT, Hipaa, homeland security, medical, vulnerability