Tag: mobile security

Friend or foe? Cybersecurity risks for shared data and a few precautions

Mom always said to choose your friends wisely. Maybe she was trying to protect you from a data breach. AT&T learned that lesson the hard way. From a statement released by the company : “We recently learned that three employees … Continue reading

Posted in HIPAA Compliance, Information Technology Tips, PCI Compliance | Tagged , , , , , , | Leave a comment

More Live-Blogging from mHealth Summit – December 9

Breakout Session 11-12 Monday: The Role of Patient Privacy & Security Innovations Kenneth A. Kleinberg, Managing Director, Research & Insights Ed Ricks (Beauford Memorial Hospital) There’s always a question of the tipping point, and with EMR, we’ve reached this point. … Continue reading

Posted in HIPAA Compliance, Information Technology Tips, Mobile Security, Online Tech News | Tagged , , , , , , , | Leave a comment

The Impact of mHealth: Midwest HIMSS Conference Recap

Last week Online Tech was in Milwaukee at the Midwest HIMSS Fall Technology Conference exhibiting our HIPAA compliant hosting solutions. There were about thirty different sessions on a variety of different topics related to healthcare IT, and with such a … Continue reading

Posted in HIPAA Compliance, Information Technology Tips, Mobile Security | Tagged , , , , , , , , | Leave a comment

Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks

Online Tech is liveblogging from Milwaukee at Rock IT Around the Clock! That’s the theme for the HIMSS Midwest Area Chapters Fall Technology Conference November 10-12, where we’re exhibiting our HIPAA hosting solutions at booth #501. Here’s our takeaways from a session … Continue reading

Posted in HIPAA Compliance | Tagged , , , , , , , | Leave a comment

HIPAA Encryption: Protecting Patient Data on Tablets & Smartphones

A guest blog from HITECHAnswers.net lists security tips from HHS.gov to help ensure that patient data is secure in a BYOD (Bring Your Own Device) environment that includes the use of personal devices such as iPhones and iPads in the … Continue reading

Posted in Encryption, HIPAA Compliance, Mobile Security | Tagged , , , , , , , , , | Leave a comment

To be BYOD or not to be BYOD: Is a “Bring Your Own Device” Policy Right for Your Organization?

Join Attorney Tatiana Melnik and Senior Product Architect Steve Aiello as they discuss how to securely implement an effective BYOD (Bring Your Own Device) strategy in your workplace. Title: To be BYOD or not to be BYOD: Is a “Bring Your … Continue reading

Posted in Mobile Security | Tagged , , | Leave a comment

Privacy & Security Forum: Managing Medical Device Security Vulnerabilities

A little back and forth from the session about medical device integration: How to Manage Security Vulnerabilities of Medical Devices as They are Integrated with the Broader Health IT Infrastructure Moderator:  David Finn Health IT Officer, Symantec Speakers: George Fidas, … Continue reading

Posted in Online Tech News | Tagged , , | Leave a comment

HIPAA Encryption in the Cloud: Don’t Sacrifice Performance for Security

Earlier this year, OCR (Office for Civil Rights) Director Leon Rodriguez was quoted on the topic of HIPAA encryption: “…regardless of size, covered entities must take action and will be held accountable for safeguarding their patients’ health information. Encryption is an … Continue reading

Posted in Cloud Computing, Encryption, HIPAA Compliance | Tagged , , , , , , , | Leave a comment

Total Ecommerce Sales Rise 18 Percent in Q2 with Mobile Commerce

InternetRetailer.com recently reported that ecommerce sales have increased to 18.4 percent, as estimated by the U.S. Commerce Department in Q2, bringing online sales back to their pre-recession growth rates. Comparing Q2 2013 to Q2 2012, ecommerce sales rose to $65 … Continue reading

Posted in Mobile Security, PCI Compliance | Tagged , , , , , | Leave a comment

Securing Regulated Data with a Private Cloud Infrastructure

Dr. Larry Ponemon, chairman and founder of the Ponemon Institute described how the shift of the attack surface from the mobile device is moving to unsecure places in the cloud environment with unsecure data, as reported by HealthITSecurity.com. More specifically, … Continue reading

Posted in Cloud Computing, Mobile Security | Tagged , , , , , | Leave a comment