
The Hitlist: Remote Access
Remote access is often one of the weakest points we find in a customer’s network. Corporations allow home users, with no real security on their
Remote access is often one of the weakest points we find in a customer’s network. Corporations allow home users, with no real security on their
It’s official, all major SSL stacks are now vulnerable. There are already a number of detailed blogs written about this new vulnerability, so I am
What Is The HIPAA Privacy Rule? Accoprding to HHS.gov, “The HIPAA Privacy Rule establishes national standards to protect individuals’ medical records and other personal health
Updated: Added information about Macs and some additional reference links. This new vulnerability is much easier to exploit than heartbleed and can have a huge negative
The Hospice of Northern Idaho (HONI) has agreed to pay the U.S. Department of Health and Human Services (HHS) $50,000 to settle potential violations of
Many of the clients we work with are either a medical service provider or a vendor to medical service providers. If they are creating, transmitting
Security budgeting is a layered approach Security is important, for an organization, and its customers. However, there is often a misconception that security costs are
All organizations should have a business continuity plan. I know that many do not. How will your business respond if: Your building burns down A
I have some friends staying with me right now from Brazil. They arrived a few days ago, and said that, due to the world cup,