Federal Health Care Reform- What they Mean to Public CIOs

The technological implications of the Federal Health Care Reform are now becoming obvious, and states are beginning to confront the burden of implementing these changes. While extending health insurance to an additional 32 million Americans presents great opportunities for the state government, it also brings with it, big risks. And these risks are mainly associated…

7 Facilities in California Fined for Privacy Breaches

Privacy protection is a growing concern for organizations despite stringent laws governing data security. Medical institutions especially are experiencing challenges in safeguarding patient information. A number of data breaches have been reported in the HIPAA healthcare industry so far. And the most recent addition to this is six hospitals and a nursing home being fined…

A Wake-Up Call for IT Security: Are Your Compliance Practices Fit for the Test?

The present IT environment is complex in nature, and much more than a handful of technical people operating and controlling systems with a few virus prevention tools. The complexity has increased manifold with a growing number of security threats being identified everyday. The security of confidential data is under question with potential risks from malicious…

Best Practices for Threat management

‘Cyber security threats’ is now the core topic of discussion amongst enterprises and will continue to be in the coming years. This is because security concerns have assumed unimaginable dimensions in the past years, posing a major challenge to the survival of businesses. Hence enterprises are now focusing more on curbing threats and making their…

Common Attack Techniques – In an Era of Industrialized Hacking

Gone are the days when hackers attacked perimeter defences. Today their objective is to take control of confidential data and the applications which process them. Hacking is now an operation involving global coordination, sophisticated techniques and persistent teamwork. And with clear roles and responsibilities being defined in the community, hacking is now a highly organized,…

Implications of the ‘Dodd-Frank Wall Street Reform & Consumer Protection Act’, on Data Security

While the financial services regulatory reform bill signed into law by President Obama last week will take some time to be put into practice, several industry experts have noted that this extensive legislation holds immense significance for information/ data security. Creation of a new consumer protection agency at the Federal Reserve, provision of new powers…

South Shore Hospital Reports Loss of Confidential Data- 800,000 Private Records at Risk

Just a week after Health Net faced penalty for a major security breach, another similar incident has been reported by the South Shore Hospital in Weymouth Massachusetts, USA. Authorities say that computer files containing personal information of nearly 800,000 people were lost when they were being shipped to a contractor for destruction. Information on the…

New Security Standard for SMBs to Protect Cardholder Information

You must have read the news about a new security standard for SMBs- Visa changes rules for SMBs: be PCI DSS compliant or face penalties– Primarily focusing on safeguarding customers_blank’ confidential data after making payment using a credit card, this new security standard requires SMBs accepting credit/ debit card payments to enroll into the PCI…