Plug-and-Play POS: Can It Ever Be Secure?
Tackling the microwave nation mentality. By: Brand BarneyAs a microwave nation, we have a very plug-and-play mentality when it comes to electronics and devices. When my morning coffee takes longer than...
View ArticleCould Your Waiting Room Wi-Fi Be Sabotaged?
Wireless network configuration best practices. By: Tod FerranIt’s good to keep patients entertained while in the waiting room. According to 2013 Software Advice survey, 90% of U.S. patients are...
View ArticleSecuring Keys and Certificates: A PCI Auditor’s Perspective
Gary Glover and Brandon Benson on keys, Heartbleed, and security. Businesses must ensure their key servers, certificate authorities, open SSL libraries, and server updates are secure. Christine Drake...
View ArticleMy OCR Audit, and How I Survived
An interview with Doreen Espinoza of UHIN. Doreen EspinozaDoreen Espinoza, Business Development and Privacy Officer of UHIN answered some tough questions about her audit with The Department of Health...
View ArticleSSL 3.0: POODLE Vulnerability Update
Who it affects, how hackers could use it, and what you should do about it.You’ve probably heard about the newest online security threat, POODLE. While not as menacing as Shellshock or Heartbleed, many...
View ArticleHey, Healthcare. Your Usernames and Passwords Are Embarrassing.
The IT security failure spanning every healthcare organization. By: Brand BarneyOctober is National Cyber Security Awareness Month so I thought I’d close out the month with a security tip for our IT...
View ArticleIs Your Business Prepared for the Physical Security Threat?
Prevent stolen tablets, smartphones, and laptops with these basic tips. By: David EllisPractically every business has access to at least one laptop, tablet, and smartphone. For many organizations such...
View Article10 Commonly Asked Questions About PCI DSS 3.0
Get the facts before the 2015 deadline. By GilesWitherspoon-BoydThe newest Payment Card Industry Data Security Standard (PCI DSS) officially goes into effect on January 1, 2015. With the introduction...
View ArticleNature’s 7 Hacker Defense Mechanisms
What businesses can learn from armadillos, seahorses, and zebras. By GilesWitherspoon-BoydHackers are a lot like predators in the wild. After finding an unsuspecting animal, nature’s hunters test their...
View ArticleHIPAA Security Tip: Understand Your Data Flow
Increase security and take the pain out of HIPAA compliance. This article is an excerpt from our ebook, 5 Healthcare Security Lessons From the Field. To download your free copy of the complete ebook,...
View ArticleSecurity Awareness Guidance From the PCI Council
How do you encourage your employees to make security a priority?By: Gary GloverEmployees can make or break your security. Like my colleague David Ellis says about phishing, “It doesn’t matter if you...
View ArticleCrucial Security Advisory: Patch Windows Immediately
Windows Schannel vulnerability affects every Windows user in the worldMicrosoft just reported and released a patch to a vulnerability (CVE-2014-6321) on November 11, 2014 that affects every single...
View ArticleCoding Culture Will Ruin Your Audit…and Your Security
Developers do not follow secure coding guidelines, but it’s not entirely their fault.By: Brand BarneyAccording to OWASP, one in five companies experienced a data breach due to a web application...
View ArticleThe #1 Way to Help Your HIPAA Audits Go Faster
How can you secure your organization without knowing how patient data travels?By: Tod FerranEvery privacy/security/compliance official should understand the specific details of how patient data flows...
View ArticleStart the Holidays Right: 20% Discount on Vulnerability Scanning
Security is our present to you. In an effort to lessen the rash of business compromises that coincide with the holiday shopping season, we are offering adiscount on vulnerability scanningfor new and...
View ArticleHow Healthcare Remains Insecure, and What One HIE Decided to Do About It
Exchanging patient data securely takes planning and effort. By: Tod FerranI don’t envy the healthcare industry. On one hand, Meaningful Use wants providers to increase the flow of records and on the...
View Article5 Commonly Overlooked Security Errors
How most service providers fail PCI DSS audits. This article was also featured in the TSYS Ngenuity JournalBy: Mark MinerPCI security assessors visit service providers to poke through every nook and...
View ArticleWhy You Need Both a Hardware and Software Firewall
HIPAA compliant firewalls in 60 seconds. By: Tod FerranHow do you block access to your systems (and sensitive data) from hackers in the outside world? The easiest way is through a firewall. Firewalls...
View ArticleShould I Outsource My Ecommerce Payments?
Is outsourcing a viable option for reducing PCI scope? By: Gary GloverCreating an easily navigated, customer friendly ecommerce solution is challenging. Building an ecommerce website that conforms to...
View ArticleCould Your Waiting Room Wi-Fi Be Sabotaged?
Wireless network configuration best practices. By: Tod FerranIt’s good to keep patients entertained while in the waiting room. According to a 2013 Software Advice survey, 90% of U.S. patients are...
View Article