Subscribe

Did Russia Invade Vermont?


Posted January 10, 2017 in Malware, Data Breach, Cloud Security

One way investigators have of identifying the source of computer hacks is by looking at the code.  Last week, malware...

Medicare Payments and Penalties in 2017


Posted December 30, 2016 in Compliance, Cloud Security, Data Breach

The number of physicians who will see their Medicare payments reduced by the Centers for Medicare & Medicaid...

Data Breach Impacts Nearly 400,000


Posted December 30, 2016 in Compliance, Data Breach, Digital Forensics

On November 7 of this year, Community Health Plan of Washington (CHPW), a nonprofit Medicaid-based health insurance...

What You Need to Know About Watering Hole Attacks

What You Need to Know About Watering Hole Attacks


Posted December 29, 2016 in Malware, Data Breach, Cloud Security

We may never know exactly what happened to American electorate system during 2016, who was responsible, or how it...

Would You Let a Nurse Perform Your Heart Surgery?


Posted December 29, 2016 in Data Breach, Compliance, Cloud Security

Would you sign off on a room nurse performing open heart surgery on you? No, right? Then why do you buy devices that...

How Industry Security Standards Can Cut Out Human Error


Posted December 29, 2016 in Data Breach, HIPAA, Compliance, Malware

The best part of the holidays is that the entire family is in one place, making for some great bonding experiences....

The Government’s HIPAA Guidelines Decoded


Posted December 29, 2016 in HIPAA, Compliance, Data Breach

When you’re looking for clarity and conciseness, there’s two places you don’t want to go: Legal guidelines and...

Spyware in the Real World


Posted December 29, 2016 in Compliance, Malware, Data Breach

When people think of hackers, they think of greasy people stuck to a computer in dark basements all over the world....