TechR2

OHSU violates its patients’ HIPAA rights.

OHSU violates its patients’ HIPAA rights. HIPAA violations are not taken lightly; whether it was your fault or not, your company could be held responsible for any data breach that compromises the private information of your customers. Oregon Health & Science University (OHSU) found this out the hard way. OHSU had to notify over 3,000 […]

Technology is Taking Over Halloween!

Technology is Taking Over Halloween! Technology has worked its way in to every aspect of our lives, just about. It has also started to creep its way in to other aspects of our lives and culture, such as Halloween. It may sound silly but technology and techy trends have started to take over the scariest […]

Cloud Security Alliance identifies new data security risks

Cloud Security Alliance identifies new data security risks The Cloud may be a hole in your data security. As concerns grow regarding how secure your data really is when stored in the Cloud, the industry must react. The Cloud Security Alliance (CSA) has made additions to the guidelines of its Cloud Control Matrix (CCM). This […]

3 Common Concerns with BYOD Policies

  Bring your own device (BYOD) and virtual environments are on a steady rise across the globe. BYOD policy adoption rates alone are estimated to be in the 40%-70% range. This rise is mainly attributed to the rise of smart phones and consumer electronics such as tablets and notebooks. This is great for employees and […]

Healthcare Information Security is the Most Difficult.

  IT security is no cakewalk to begin with, but healthcare IT security is by far the most difficult. They have compliances and standards to meet, HIPAA for example, like all other sectors; but it’s the transfer, storage, and access of information that is most difficult to control and monitor. In the financial sector everything […]

Mobile Device Management in Healthcare

  Mobile devices and bring your own device (BYOD) policies are quickly changing the landscape of healthcare facilities. The number of these devices in facilities is growing rapidly as well as the production and diversity of mobile devices overall. This movement is expected to help curb the cost of healthcare processes (which are steadily rising), […]

Data Security Predictions for 2014

  With the Target breach closing out the year with a bang, specialists have put together some predictions for the year to come. The theme for 2014 is heightened expectations. Consumers and regulators are expected to put more pressure on organizations to step up their security measures throughout 2014. Kroll Advisory Solutions recently released its […]

Data Loss Prevention Best Practices

  Data loss prevention (DLP) is going to become even more important now that BYOD policies are taking over. It is important to understand what steps need to be taken and what considerations need to be made in order to protect your organization and its brand. We have touched on this subject before but its […]

Intense Expectations for Healthcare Security Predicted in 2014

  In 2013, 45% of data breaches were in the healthcare industry. Because of this, compliance and regulations in healthcare are expected to intensify throughout this calender year. This will not bode well for what healthcare privacy, information security, and compliance officers were wishing for this year. In a recent survey performed by ID experts […]

What is Cyber Liability Insurance and Why is it Important?

  Cyber liability insurance protects an organization from risks associated with e-business, the internet, networks, and informational assets controlled by first and third parties. The original cyber liability policies written were almost soely for companies providing computer hardware and software services. Today, with ever changing state and federal regulations, plus the addition of compliance standards […]