Tag: mobile security

Mom always said to choose your friends wisely. Maybe she was trying to protect you from a data breach. AT&T learned that lesson the hard way. From a statement released by the company : “We recently learned that three employees of one of our vendors accessed some AT&T customer accounts without proper authorization. This is completely counter to the way we require our vendors to conduct business. We know our customers count on us and those who support our business …

Breakout Session 11-12 Monday: The Role of Patient Privacy & Security Innovations Kenneth A. Kleinberg, Managing Director, Research & Insights Ed Ricks (Beauford Memorial Hospital) There’s always a question of the tipping point, and with EMR, we’ve reached this point. Mobile health is transitioning from an optional thing to integrated and mandatory. With new technologies, the applications and the promise lead, and the management lags, and I think in this space it’s true. 5 categories of mobile health use: Access/interaction …

Last week Online Tech was in Milwaukee at the Midwest HIMSS Fall Technology Conference exhibiting our HIPAA compliant hosting solutions. There were about thirty different sessions on a variety of different topics related to healthcare IT, and with such a large concentration of healthcare professionals, the conversation was enriching. Here’s a recap from one of the most prolific topics regarding healthcare IT today: mobile. Preventative care and wellness In the session Key Success Factors to Delivering Population Health Management, Marilyn …

Online Tech is liveblogging from Milwaukee at Rock IT Around the Clock! That’s the theme for the HIMSS Midwest Area Chapters Fall Technology Conference November 10-12, where we’re exhibiting our HIPAA hosting solutions at booth #501. Here’s our takeaways from a session on cyber security: Session: Cyber Attacks from Shanghai: Prepared? Speaker: Ali Pabrai Firewalls are our first line of defense! Antivirus control Many vulnerabilities enter the network via employees’ email activities. Authentication control This is a critical area We struggle with …

A guest blog from HITECHAnswers.net lists security tips from HHS.gov to help ensure that patient data is secure in a BYOD (Bring Your Own Device) environment that includes the use of personal devices such as iPhones and iPads in the workplace. One of HealthIT.gov’s tips includes encrypting data stored locally on your mobile device as well as data sent by your device (data at rest and in transit). While device encryption can provide one layer of defense, if you go …

Join Attorney Tatiana Melnik and Senior Product Architect Steve Aiello as they discuss how to securely implement an effective BYOD (Bring Your Own Device) strategy in your workplace. Title: To be BYOD or not to be BYOD: Is a “Bring Your Own Device” Policy Right for Your Organization? Register: Sign up online Who: Attorney Tatiana Melnik and Online Tech’s Senior Product Architect Steve Aiello When: Nov 12, 2013; 2:00 PM – 3:00 PM (EST) Description: Mobile devices are becoming ubiquitous in all companies, including those …

A little back and forth from the session about medical device integration: How to Manage Security Vulnerabilities of Medical Devices as They are Integrated with the Broader Health IT Infrastructure Moderator:  David Finn Health IT Officer, Symantec Speakers: George Fidas, Jr. Product Security Officer, Patient Care and Clinical Informatics, Philips Healthcare; Steve Merritt Manager, Imaging and Clinical Systems, Baystate Health; Paul Scheib IS Operations Director and Chief Information Security Officer, Boston Children’s Hospital There’s a lot of speculation on how …

Earlier this year, OCR (Office for Civil Rights) Director Leon Rodriguez was quoted on the topic of HIPAA encryption: “…regardless of size, covered entities must take action and will be held accountable for safeguarding their patients’ health information. Encryption is an easy method for making lost information unusable, unreadable and undecipherable.” This was in response to the first HIPAA breach settlement involving a case affecting less than 500 patients in which an unencrypted laptop was stolen. The hospice company never conducted …

InternetRetailer.com recently reported that ecommerce sales have increased to 18.4 percent, as estimated by the U.S. Commerce Department in Q2, bringing online sales back to their pre-recession growth rates. Comparing Q2 2013 to Q2 2012, ecommerce sales rose to $65 billion compared to $54.7 billion, the largest year-over-year increase since before 2008. Much of the growth in online retail sales are attributed to the largest retailers, including Wal-Mart and Amazon, rising 30 and 29.6 percent in online retail sales, respectively. …

Dr. Larry Ponemon, chairman and founder of the Ponemon Institute described how the shift of the attack surface from the mobile device is moving to unsecure places in the cloud environment with unsecure data, as reported by HealthITSecurity.com. More specifically, he addresses how moving data to cloud computing environments such as DropBox compromise the security of the data accessible from mobile devices. In a recent study released by the Ponemon Institute, The Risk of Regulated Data on Mobile Devices & …

Get started now. Exceptional service awaits.

Live Chat