Checking compliance and security, the Aegify way In 1996, the Health Information Portability and Accountability Act, most commonly known as HIPAA, was passed with one of its goals being to ensure uninterrupted coverage for patients. Health Care Organizations (HCOs) need to be able to pass patient records and other data back-and-forth. For this to happen…Details
Security Analysis The task of managing security is complex. Over 32K security gaps are now documented as potential vulnerabilities and are growing alarmingly. The recently discovered vulnerabilities that were lying dormant for years, such as the Heart-bleed, shell shock, and poodle bugs, and the recent GHOST vulnerability have added new dimensions to the security gaps.…Details
In this whitepaper you will learn 5 steps to achieving HIPAA Compliance. However, given that new vulnerabilities are discovered every day, it is imperative to conduct HIPAA assessments regularly. It is not a one-time endeavor and should be completed once every quarter at the minimum.
In this whitepaper we will discuss our effort to deploy a secure SaaS. Cloud infrastructure has indeed been a very attractive proposition to many enterprises, small or large, from the features that cloud infrastructure providers offer today. But cloud security is sometimes raised as a matter of concern. Therefore, when Aegify took its information security…Details