Tagged With "Security"

Comment

Re: The Heavy Toll of Poor Data Security in Healthcare

tonyl ·
I am out of the office until 09/01/2014. I will respond to your message when I return. Note: This is an automated response to your message "Post By Art Post: The Heavy Toll of Poor Data Security in Healthcare" sent on 8/27/2014 8:12:05 AM. This is the only notification you will receive while this person is away.
Comment

Re: The Continuing Issue of Reactionary IT Security in Health Care

Larry Kirsch ·
Nice article. Valuable information.
Comment

Re: What Does Comprehensive Data Security Look Like?

Larry Kirsch ·
Excellent. Providing this to the stakeholder is a necessary step to avoiding data compromise. Nice article.
Comment

Re: Time is Now for Intelligent Data Security

Larry Kirsch ·
Awareness is a first step. Action is next . Delay is costly. Risk assessment test. Good article.
Comment

Re: 'Make a Difference' or 'Make a Profit' with Copier Accessories

Martin Hofman ·
Thanks Art! How great that you share this 'secret' with you colleagues (& competitors). Anyone interested in a 'Dealer-Starter-Kit' (-70%) contact Mike at sales@copiersolutionshop.com
Comment

Re: 'Make a Difference' or 'Make a Profit' with Copier Accessories

Art Post ·
TY, Martin, I enjoy sharing my secrets with others, all to help us better support our families an lifestyle!
Comment

Re: 'Make a Difference' or 'Make a Profit' with Copier Accessories

Kyocera Guy ·
Nice tip Art. Thanks!
Comment

Re: 'Make a Difference' or 'Make a Profit' with Copier Accessories

Art Post ·
Awesome!! Glad you liked it!
Comment

Re: How dentists should comply with HIPAA

Keith Thompson ·
I am out of the office until 08/04/2015. I am away if you need to talk to someone please contact Darren Downey our GM Office 633-9264 X 226 Cell 204.229.7231 My Cell is 204.890.8570 Note: This is an automated response to your message "Post By David Bailey (Guest): How dentists should comply with HIPAA" sent on 4/1/2015 11:14:20 PM. This is the only notification you will receive while this person is away.
Comment

Re: New Survey Reveals Consistent Failures in Healthcare IT Security

Murleybacher ·
can you send me an application to sign up for a premium membership - thanks
Comment

Re: Part 2 - Hacking increasing by 1600%* - 6 issues impacting Data Security?

SalesServiceGuy ·
Wow! I had no idea that it was now so much more convenient to launch a malevolent attack on a company's IT infrastructure.
Comment

Re: Part 2 - Hacking increasing by 1600%* - 6 issues impacting Data Security?

Art Post ·
Anyone can be a hacker now
Blog Post

Sophisticated hacker group FIN4 strikes Wall Street

Art Post ·
Imagine receiving an email that claims another employee is talking about you in a public forum, and forwarding a link to the forum as proof. It looks legitimate enough, as the email is from a longtime client with whom you recently discussed business....
Blog Post

The BYOD Side of Health Care IT Security

David Bailey ·
In the past several years, plenty of trends in corporate IT have taken shape and intensified, but perhaps none quite as impactful and challenging as enterprise mobility. Sure, the Internet of Things is beginning to scale up and challenge managers in the IT department, but it will take years for this trend to see the same types of gains in adoption as enterprise mobility and, specifically, BYOD, have seen of late. Lost or stolen devices, rogue IT, poor control over access, no governance and...
Blog Post

The Complexity is Real in Health Care Security

The average organization, regardless of size or industry, is under a greater threat of data breach than ever before, as digital risks continue to propagate and the defenses to avoid them lag. As a result, the frequency and subsequent damages...
Blog Post

The Continuing Issue of Reactionary IT Security in Health Care

David Bailey ·
Health care providers have been hot and cold with respect to protecting patient data of late, as many have made progressive moves to protect their systems and information, while others have lagged behind in this regard. Although retailers and others...
Blog Post

The Heavy Toll of Poor Data Security in Healthcare

Art Post ·
In what has become a farce of sorts, health care providers appear to remain far behind the learning curve when it comes to data, network and email security, as breaches have been on a torridly rising path in the past few months. Although retailers...
Blog Post

A Broad Scope of Health Care Data Security

Art Post ·
The health care security arena has become more complex and challenging in recent years, driven by all different types of stressors, pain points, new technologies, compliance overhauls and more. In many ways, patient information has been widely viewed...
Blog Post

A Closer Look at Data Breach Avoidance & Response

Art Post ·
Data breaches have become some of the more dangerous and frequent threats to corporate continuity in the past few years, as many organizations have struggled to either avoid or recovery from major instances of information loss and exposure. In many...
Blog Post

A Few Reasons Why You Need to Enabling Secure Printing

Art Post ·
Lurking in the shadows of your office is a disgruntled employee, he or she has already interviewed for other sales jobs and last week accepted a sales job at a competitor. But this sneaky son of bitch negotiated that he or she can't start...
Blog Post

Bank Achieves AP Process Improvement with Cloud-based Digital Workflows and Secure Document Storage

Art Post ·
Bank Achieves AP Process Improvement with Cloud-based Digital Workflows and Secure Document Storage Southeast National Bank implemented DocuWare, a modern document management solution, to digitize its own accounts payable process. The results: invoice approval time dropped from one week to a few hours positioning the company for future growth without the need to add staff. Southeast National Bank (SENB) is a regional bank with 5 branches and 65 employees, offering a full range of banking...
Blog Post

Email Security is Moving Into More Prominent Positions

Art Post ·
Boardroom executives have had to be exceptionally agile when developing and releasing new forms of security controls for their information technology and communications frameworks, especially as the frequency of damage associated with breaches...
Blog Post

Enterprise Mobility Security Remains Challenging

David Bailey ·
The healthcare sector has had to overcome a wealth of challenges when it comes to IT security, service management and delivery in the past few years, with so many new tools and solutions quickly gaining a vital designation among leaders. From telemedicine and mobility to big data and electronic health record system management, the average medical firm is using technologies that were not even available only a couple of decades ago. For the purposes of this blog, the focus will be placed on...
Blog Post

Hacking increasing by 1600%* - What is really going on with Data Security?

Dan Taylor ·
Before you switch off as you consider security uninteresting, just remember that if you think about it George Lucas has made $5.3 billion out of a data breach story. General Tagge " If the Rebels have obtained a complete technical readout of this station it is possible, however unlikely, that they might find a weakness, and exploit it." Before we start let us say we aren't self-appointed gurus, we are most likely just like you, a user/business person. During this search, we realised that we...
Blog Post

Health Care Email Security Still Needs Improving

David Bailey ·
Despite the fact that so many data breaches have impacted the health care sector in the past few years, and a high percentage of them have been traced back to poor email security, it does not seem as though industry players are really rising to the...
Blog Post

Health care industry is No. 1 for cyberattacks

Art Post ·
The FBI has warned that cyberattacks are on the rise - and health care companies are often the target hackers seek. An attack that took place in August on Community Health Systems Inc., the No. 2 publicly traded U.S. hospital group, compounded concern...
Blog Post

Health Care Still Struggling with Email Security

Art Post ·
The health care sector has come under fire of late due to an increased prevalence of data breaches, privacy failures and more, while many of the more damaging events have actually been the result of relatively simple mistakes. Although the retail...
Blog Post

Healthcare IT Security Legislation Changes

David Bailey ·
Information security has been among the most widely discussed topics in the healthcare sector for the past several years running, as regulators in Washington and advocacy group officials work to tighten up best practices, standards and compliance requirements. Data breaches have been widespread, impacting millions of patients over the past several years, and some of the more massive events in cybersecurity history have hit in the past 12 months alone. So many factors are making it more...
Blog Post

Healthcare IT Security Onus Remains on Access Control

David Bailey ·
As major trends in corporate computing such as the Internet of Things, enterprise mobility, big data and telecommuting continue to intensify, security professionals have increasingly urged leaders to understand the importance of enhanced access control. Up until this point, simple passwords have been the most common means of authenticating users and allowing individuals to use and share sensitive corporate information through a range of platforms, websites and devices. However, the...
Blog Post

Healthcare organizations at risk of Shellshock vulnerability

Art Post ·
Security threats are growing in abundance as more health organizations choose to host large quantities of patients' personal and medical information in data centers, locally and across the country. A recent study from McAfee discovered over 31 million...
Blog Post

Healthcare's Next Step with Secure Cloud Demands

David Bailey ·
Cloud computing has remained one of the most important trends to ever have surfaced in corporate IT, as it quickly overhauled the ways in which organizations provision, use, maintain and optimize their technological assets. Although cloud markets were first very heavy on software, the industry has evolved rapidly to offer infrastructure, platform and other options necessary to have a fully functional and optimally enabled IT department. Still, security has been a touchy subject for cloud...
Blog Post

How can healthcare organizations choose and use email encryption?

Art Post ·
Email Encryption has become an important asset for healthcare organizations in a world where cybersecurity is a necessity. Although it doesn't seem like the most fancy or complex protection tool, it can be an amazing resource for email...
Blog Post

Email security has transcended into ridiculousness

While it is never good to make light of a serious situation such as IT security, businesses as well as health care providers and government agencies have been making it quite difficult to keep a lid on hilarity. That was meant to evoke "Hillary," in...
Blog Post

How dentists should comply with HIPAA

Dentists should ensure their methods of HIPAA compliance are up to date. According to Dentistry IQ, all positions within the dental field have to know how to approach the legislation, including receptionists, assistants, dental hygienists and IT...
Blog Post

Cloud security considerations for healthcare organizations

Art Post ·
Cloud computing has numerous benefits for organizations in the healthcare industry, as many departments can find applications and data to host in the cloud environment, making resource provisioning easier and allowing employees to use less physical...
Blog Post

Data Analytics Raises Health Care IT Security Concerns

David Bailey ·
Health care providers have been somewhat under the gun when it comes to the integrity, security and privacy of patient data for more than a decade now, while breaches have increased in prevalence and damage. The onus has been decisively placed on individual medical firms to begin making more progressive changes to their IT security and general data management strategies, but the entirety of the sector is increasingly expected to invest more time and resources into these endeavors.
Blog Post

Do Not Avoid the Cloud: Get a Managed Service and Capitalize

Art Post ·
Businesses continue to become more interested in the power of the cloud, though recent data breaches have appeared to reignite fears that this technology is simply impossible to secure. Although this should be common knowledge by now, cloud computing...
Blog Post

My Awesome Take Aways from West McDonald's Blog about Document Security

Art Post ·
It's thirteen minutes after 10PM, and I'm still not done with updating the P4P Hotel forums with various industry news that came across my alerts today. Earlier in the day, I took a few minutes to read the latest blog from West McDonald titled "A Lesson for Office Equipment Channel from the Alleged Realty Winner Leaks". My first thought was who the heck would name their child Reality with the last name of Winner? Well, I can't fault them, because at one time I thought what if I named my son...
Blog Post

New Survey Reveals Consistent Failures in Healthcare IT Security

It might seem as though journalists and analysts have been beating a dead horse with the information on healthcare's severe IT security struggles, but awareness is critical in the fight against modern cybercrime. This is especially true given the...
Blog Post

One More Piece of Evidence that Security Needs More Attention

Art Post ·
In many ways, the war between hackers and victims has moved into a more farcical position in the past few years, with fraudsters finding ways to break into the most heavily guarded and protected systems, stealing information and causing hundreds of...
Blog Post

Part 2 - Hacking increasing by 1600%* - 6 issues impacting Data Security?

Dan Taylor ·
In this series of articles, we will cover a number of topics around security 1. What is really going on? 2. Why is this happening? 3. Who are they? 4. What are the different types of threats? 5. What can you do about it? Part 2 - Why is this happening and why is the security discussion different now? In the second part of the series, in this article, we cover the key 6 reasons this happening and why you should be looking at security differently. 1. Availability of Hacking Software - “There's...
Blog Post

Planning for the Future with DocuWare

Planning for the Future with DocuWare   Third-party retirement plan administrator, ADMIN Partners is using DocuWare to transform their business processes from paper-based to completely digital workflows, increasing efficiency and transparency...
Blog Post

4 trends that heighten the need for stronger healthcare IT security

IT security has been - and should be - the central focus for corporate decision-makers in virtually every segment of the private and public sectors today, as the rate of these events and the size of subsequent damages have both skyrocketed. Several...
Blog Post

5 Internet and secure email tips

Art Post ·
Hillary Clinton has certainly been under fire in the news recently for her insecure email usage. However, there are many strategies businesses can teach their employees and learn from Clinton's mistakes to ensure safe technology use in the workplace....
Blog Post

5 Predictions for 2017 About ECM and the Future of Digital Documents

Nicole Puhala ·
5 predictions for 2017 about ECM and optimizing workflow processes.
Blog Post

5 Steps Toward Stronger Email Security and HIPAA Compliance

Email security has been a relatively major pain point for organizations across industries and sectors in the past few years, as this immensely popular communication medium tends to be an easy entry point for hackers and other threats. Unfortunately,...
Blog Post

In Focus: Email Security, Management

Art Post ·
In many instances, business leaders believe that email security is among the least of their concerns when it comes to data management and protection, focusing the entirety of their efforts on other communications tools, infrastructure components,...
Blog Post

Is Healthcare Prepared for Internet of Things?

David Bailey ·
The Internet of Things has been among the more widely discussed and hyped trends in corporate computing throughout the past few years, and is only continuing to gain steam given the explosion of new devices entering the market. Considering the fact that health care firms have thus far struggled to get a handle on enterprise mobility, which only entails smartphones, tablets and portable computer, leaders need to begin planning for the IoT as soon as possible with a specific focus on security.
Blog Post

IT Security, Compliance Become a Difficult Balancing Act

David Bailey ·
Organizations in health care and virtually every sector have been challenged significantly of late when it comes to protecting information from breach, exposure, theft and loss, as so many threats have emerged in such a small period of time. The cost of experiencing a major data breach is going up quickly as the years pass, and the rate of entities (healthcare providers) to not have been impacted by one of these events is falling fast as well. These are some of the many reasons why...
Blog Post

IT Security Concerns Spreading Quickly

David Bailey ·
The IT security arena has been tempestuous of late, to say the least, as hackers continue to pose a serious threat to healthcare organizations, consumers and public-sector agencies. Because of how quickly technology has progressed in the past few years - as well as the rapidity of adoption among companies of all industries and sizes - the fact that leaders are struggling to craft and execute an effective security program should not be all that surprising. Although much of the attention has...
×
×
×
×
×