Skip to main content

Tagged With "Data Breach"

Comment

Re: The Heavy Toll of Poor Data Security in Healthcare

tonyl ·
I am out of the office until 09/01/2014. I will respond to your message when I return. Note: This is an automated response to your message "Post By Art Post: The Heavy Toll of Poor Data Security in Healthcare" sent on 8/27/2014 8:12:05 AM. This is the only notification you will receive while this person is away.
Comment

Re: How dentists should comply with HIPAA

Keith Thompson ·
I am out of the office until 08/04/2015. I am away if you need to talk to someone please contact Darren Downey our GM Office 633-9264 X 226 Cell 204.229.7231 My Cell is 204.890.8570 Note: This is an automated response to your message "Post By David Bailey (Guest): How dentists should comply with HIPAA" sent on 4/1/2015 11:14:20 PM. This is the only notification you will receive while this person is away.
Comment

Re: IT Security, Compliance Become a Difficult Balancing Act

Sherri ·
Thank you for your e-mail. I will be out of the office and have limited access to my e-mail from March 31st through April 10th.. I will review your message upon my return. In my absence please feel free to contact Jim Singer ( jim@kopi.ws ) or Cynthia Wankum ( cynthia@kopi.ws ) for immediate assistance during this time. Have a great day! Sherri Wilbers President KOPI 518 Cheyenne Drive Jefferson City, MO 65109 573-893-4545 (ext. 203) www.kopi.ws sherri@kopi.ws
Blog Post

This Week in the Copier Industry 5 Years Ago, The Second Week in September 2013

Art Post ·
Here they are. Our top threads from five years ago in the Print4Pay Hotel RICOH UNVEILS NEW AWARD-WINNING SOLUTIONS AT PRINT 13, PROVIDING SUPERIOR CONTROL FOR PERSONALIZED DOCUMENTS Art Post · 9/9/138:07 PM shops today and allows operators to easily implement logic-based ticketing, and choose media and finishing options that apply to statements of variable lengths - achieving identical output across Ricoh , Xerox and Kodak devices, saving time and increasing asset utilization in the...
Blog Post

MSP & MSSP Industry Notes for April 18th, 2020

Art Post ·
MSP & MSSP Industry Notes Sponsored by Arcoa Group ARCOA Group is here to help you successfully manage your IT Asset Disposition process. We help you recover value from retired electronic equipment through responsible methods of reuse and recycling. We ensure proper handling of assets which may contain data, while being environment stewards for assets that have no reuse value and are headed for recycling. We’ve built a robust de-manufacturing process to offer additional options for asset...
Blog Post

Imaging Channel's Classroom

Ray Stasiezcko ·
"Repetitive learning is a Procrastinator's Journey." It's not about Chairs or seats, no meters, one-rate, everything free, or what a few minuscule-dealers with less than 100 customers claim to be doing new ever week, which will align the Copier/Printer industry with the realities of the marketplace. It's about smart business people understanding the importance of data over the noise of nonsense. Those who follow me will remember back when the industry started filling seats in courses on how...
Blog Post

MSP & MSSP Industry Notes for February 15th, 2020

Art Post ·
MSP & MSSP Industry Notes Sponsored by Arcoa Group ARCOA Group is here to help you successfully manage your IT Asset Disposition process. We help you recover value from retired electronic equipment through responsible methods of reuse and recycling. We ensure proper handling of assets which may contain data, while being environment stewards for assets that have no reuse value and are headed for recycling. We’ve built a robust de-manufacturing process to offer additional options for asset...
Blog Post

The Imaging Channel's ERP!

Ray Stasiezcko ·
Let's explore the reasons ECI's E-Automate is maintaining and adding to its massive customer base of Imaging Channel dealers and why I believe dealers should not, at this point, attempt to replace an ERP. Today there's a copious of solutions for resellers to manage individual deliverables. The imaging channel resellers, managed IT service resellers, or our friends delivering office products. These reseller groups are in-fact consolidating and even converging into each other's spaces. This...
Blog Post

MSP & MSSP Industry Notes for March 14th, 2020

Art Post ·
MSP & MSSP Industry Notes Sponsored by Arcoa Group ARCOA Group is here to help you successfully manage your IT Asset Disposition process. We help you recover value from retired electronic equipment through responsible methods of reuse and recycling. We ensure proper handling of assets which may contain data, while being environment stewards for assets that have no reuse value and are headed for recycling. We’ve built a robust de-manufacturing process to offer additional options for asset...
Blog Post

MSP & MSSP Industry Notes for May 3rd, 2020

Art Post ·
MSP & MSSP Industry Notes Sponsored by Arcoa Group ARCOA Group is here to help you successfully manage your IT Asset Disposition process. We help you recover value from retired electronic equipment through responsible methods of reuse and recycling. We ensure proper handling of assets which may contain data, while being environment stewards for assets that have no reuse value and are headed for recycling. We’ve built a robust de-manufacturing process to offer additional options for asset...
Comment

Re: A Closer Look at Data Breach Avoidance & Response

tonyl ·
I am out of the office until 07/14/2014. I will respond to your message when I return. Note: This is an automated response to your message "Post By Art Post: A Closer Look at Data Breach Avoidance & Respo..." sent on 7/9/2014 9:07:01 AM. This is the only notification you will receive while this person is away.
Comment

Re: What is Business Workflow? "Part One"

margateman ·
Hi Art Dan Cellucci here from Copiers Plus. I have been at CP for 26 years. I have been doing a lot of workflow solution thru ricoh champs program and on our own with NSI Autostore etc I would love to be included in the blog etc Just wrapped up a workflow with Barcodes. Talk to you soon Happy Holidays. Dan
Comment

Re: What is Business Workflow? "Part One"

Cragarry ·
FYI
Comment

Re: What is Business Workflow? "Part One"

Larry Kirsch ·
Show up at prospects office...
Blog Post

The Immense Challenges of IT Management in Health Care

David Bailey ·
The health care sector has been under constant pressure to shore up its cybersecurity defenses in the past few years, as data breaches continue to plague the sector in the United States and abroad. At the same time, though, legislation has actively pushed medical firms to more aggressively adopt and deploy modern technologies and solutions, which has made management a very difficult prospect for many leaders in the field. In spite of the constant stream of news stories regarding major data...
Blog Post

This Week in the Copier/Office Equipment Industry 10 Years Ago The Third Week of March 2006

Art Post ·
It was Monday , under the sign of Pisces . The US president was George W. Bush (Republican). In that special week of March people in US were listening to So Sick by Ne-Yo . In UK It's Chico Time by Chico was in the top 5 hits. Inside Man , directed by Spike Lee , was one of the most viewed movies released in 2006 while Micah by Laurell K. Hamilton was one of the best selling books. But much more happened that day: find out below.. March 2006 Re: 2051 duplex copy from bypass? 3/17/06 4:06 PM...
Blog Post

Healthcare IT Security Onus Remains on Access Control

David Bailey ·
As major trends in corporate computing such as the Internet of Things, enterprise mobility, big data and telecommuting continue to intensify, security professionals have increasingly urged leaders to understand the importance of enhanced access control. Up until this point, simple passwords have been the most common means of authenticating users and allowing individuals to use and share sensitive corporate information through a range of platforms, websites and devices. However, the...
Blog Post

Data Analytics Raises Health Care IT Security Concerns

David Bailey ·
Health care providers have been somewhat under the gun when it comes to the integrity, security and privacy of patient data for more than a decade now, while breaches have increased in prevalence and damage. The onus has been decisively placed on individual medical firms to begin making more progressive changes to their IT security and general data management strategies, but the entirety of the sector is increasingly expected to invest more time and resources into these endeavors.
Blog Post

Healthcare - The Road Ahead for Patient Record Protection

David Bailey (Guest) ·
IT security has finally become a more central and critical priority among health care leaders in the past few years, and this could not have come soon enough given the immense volumes of records exposed of late. Identity theft has been the most...
Blog Post

Data Management Must Be a Priority in Health Care

David Bailey ·
For virtually every healthcare provider or relevant business, the most important word in the IT lexicon has been "data" for several years now. Back in 1996, the attempts of the government to dramatically increase the accessibility and security of data became clear through the enactment of the Health Information Portability and Accountability Act, and this marked the beginning of what would become a persistent effort to improve population care. In 2009, the Health Information Technology for...
Blog Post

The High Cost of Noncompliance in Health Care

David Bailey ·
Health care IT security has been lackluster of late, to say the least, as countless breaches of patient data have taken place in a relatively short period of time with no signs of a changing tide rolling in soon. This is one of the many reasons why regulators and law enforcement officials have started to come down hard on hospitals and other medical firms that are not doing everything in their power to maintain compliance and protect information from the grasp of hackers and other threats.
Blog Post

4 trends that heighten the need for stronger healthcare IT security

David Bailey (Guest) ·
IT security has been - and should be - the central focus for corporate decision-makers in virtually every segment of the private and public sectors today, as the rate of these events and the size of subsequent damages have both skyrocketed. Several...
Blog Post

The Continuing Issue of Reactionary IT Security in Health Care

David Bailey ·
Health care providers have been hot and cold with respect to protecting patient data of late, as many have made progressive moves to protect their systems and information, while others have lagged behind in this regard. Although retailers and others...
Blog Post

Health Care Email Security Still Needs Improving

David Bailey ·
Despite the fact that so many data breaches have impacted the health care sector in the past few years, and a high percentage of them have been traced back to poor email security, it does not seem as though industry players are really rising to the...
Blog Post

What Does Comprehensive Data Security Look Like?

David Bailey ·
Information security has become one of the most widely discussed topics among boardroom members, public sector officials and consumer advocates in the past few years, as identity theft has ravaged the U.S. economy. Although progress has been made in this regard, firms are still struggling to really strike the right chords with their security programs, and the biggest problem appears to be a lack of comprehension, leading to vulnerabilities that can be capitalized upon by threats. Hackers and...
Blog Post

IT Security, Compliance Become a Difficult Balancing Act

David Bailey ·
Organizations in health care and virtually every sector have been challenged significantly of late when it comes to protecting information from breach, exposure, theft and loss, as so many threats have emerged in such a small period of time. The cost of experiencing a major data breach is going up quickly as the years pass, and the rate of entities (healthcare providers) to not have been impacted by one of these events is falling fast as well. These are some of the many reasons why...
Blog Post

When Will the Breach Threat Subside?

David Bailey ·
In the past several years, the cybersecurity arena has been moving in the wrong direction, to say the least, and it does not really seem as though the story will change any time soon. Healthcare providers, retailers, payment processors, banks and government agencies have been frequently targeted by hackers of late, while insider threats and employee negligence have actually moved into the lead for the most common causes of data breach, and consumers are suffering as a result. Identity theft...
Blog Post

New Survey Reveals Consistent Failures in Healthcare IT Security

David Bailey (Guest) ·
It might seem as though journalists and analysts have been beating a dead horse with the information on healthcare's severe IT security struggles, but awareness is critical in the fight against modern cybercrime. This is especially true given the...
Blog Post

The BYOD Side of Health Care IT Security

David Bailey ·
In the past several years, plenty of trends in corporate IT have taken shape and intensified, but perhaps none quite as impactful and challenging as enterprise mobility. Sure, the Internet of Things is beginning to scale up and challenge managers in the IT department, but it will take years for this trend to see the same types of gains in adoption as enterprise mobility and, specifically, BYOD, have seen of late. Lost or stolen devices, rogue IT, poor control over access, no governance and...
Blog Post Featured

What is Business Workflow? "Part One"

Art Post ·
Workflow has been on my mind a lot in recent months.  In order to remain current and successful in this industry I need to step it up a bit and be looking for additional workflow opportunities. What is workflow?  It's my guess that we'll see many different definitions of workflow from the different guest bloggers I have lined up.  For me, workflow means that I can shorten a manual business process, which would then save the client hours of labor. In addition, the client...
Blog Post

HIPAA and cybersecurity: Is encryption necessary?

David Bailey (Guest) ·
Cybersecurity remains an uphill battle for all fields. Healthcare has remained a high priority, due to the highly sensitive information generated and stored by organizations within the space. HIPAA, or the Health Insurance Portability and...
Blog Post

At-risk data companies should know about

David Bailey (Guest) ·
In this modern technological age, disaster recovery plans are necessary for businesses. Cyberattacks have become unavoidable for all organizations, so companies need to prepare themselves for hard-hitting hackers and keep themselves on high alert....
Blog Post

How can healthcare organizations choose and use email encryption?

Art Post ·
Email Encryption has become an important asset for healthcare organizations in a world where cybersecurity is a necessity. Although it doesn't seem like the most fancy or complex protection tool, it can be an amazing resource for email...
Blog Post

Beyond the Breach: General Data Management Considerations

Art Post ·
Much of the news related to information governance has related directly back to security and data breaches in recent years, and for good reason as a wealth of organizations have fallen victim to theft and exposure in that time frame. First and...
Blog Post

Healthcare organizations at risk of Shellshock vulnerability

Art Post ·
Security threats are growing in abundance as more health organizations choose to host large quantities of patients' personal and medical information in data centers, locally and across the country. A recent study from McAfee discovered over 31 million...
Blog Post

UC Davis Health System experiences another email breach

Art Post ·
Another healthcare organization has experienced a data breach, and this time it had nothing to do with electronic health records. Instead, the incident was caused by unauthorized access to an email account. The University of California at Davis Health...
Blog Post

Cloud security considerations for healthcare organizations

Art Post ·
Cloud computing has numerous benefits for organizations in the healthcare industry, as many departments can find applications and data to host in the cloud environment, making resource provisioning easier and allowing employees to use less physical...
Blog Post

Data breaches in healthcare costing millions

Art Post ·
The healthcare industry is undeniably a target of cybercriminals. With the increased usage of electronic health records, healthcare organizations have large volumes of data stored in data centers, on employee devices and sent through email. However,...
Blog Post

The Latest Health Care Breach Might Be the Worst

David Bailey (Guest) ·
Health care data breaches have been growing in frequency and subsequent damages for years now, while the vast majority of the events actually take place on a smaller scale among community providers. However, in the past couple of months, this has not...
Blog Post

The Complexity is Real in Health Care Security

David Bailey (Guest) ·
The average organization, regardless of size or industry, is under a greater threat of data breach than ever before, as digital risks continue to propagate and the defenses to avoid them lag. As a result, the frequency and subsequent damages...
Blog Post

The Future of Healthcare IT Will Pose Risks

David Bailey (Guest) ·
Healthcare providers were constantly under the gun when it came to the safe deployment of new technologies throughout the past several years, and it would be hard to argue that the sector at large has been highly successful in these endeavors. This is...
Blog Post

Email security has transcended into ridiculousness

David Bailey (Guest) ·
While it is never good to make light of a serious situation such as IT security, businesses as well as health care providers and government agencies have been making it quite difficult to keep a lid on hilarity. That was meant to evoke "Hillary," in...
Blog Post

Health Care Still Struggling with Email Security

Art Post ·
The health care sector has come under fire of late due to an increased prevalence of data breaches, privacy failures and more, while many of the more damaging events have actually been the result of relatively simple mistakes. Although the retail...
Blog Post

Common Threats to Health Data Security and Their Consequences

David Bailey (Guest) ·
The health care industry has been under the gun of late because of the increasing prevalence of major data breaches that have exposed the medical records of millions of individuals around the globe. As more entities fall victim to these events,...
Blog Post

Data Breach Threats Shift for Healthcare Firms

David Bailey (Guest) ·
In the past five years or so, a wealth of research and analysis has been released regarding the most common causes of data breach, as well as the associated costs of experiencing one of these events and how many entities have been impacted. What has...
Blog Post

Time is Now To Focus on HIPAA Compliant Practices

David Bailey (Guest) ·
The Health Information Portability and Accountability Act is almost 20 years old at this point, which might lead some to believe that the medical sector has a tight handle on the requirements therein. However, the statutes were never that simple, and...
Blog Post

How HIPAA may be affected by Obama's cybersecurity proposal

Art Post ·
President Barack Obama reiterated his goal to change cybersecurity in his State of the Union address on Tuesday. He hopes to accomplish more secure data through legislative modifications and his own cybersecurity proposal. However, healthcare...
Blog Post

Why using STARTTLS email encryption can prevent risks

David Bailey (Guest) ·
The Sony Entertainment hack at the end of 2014 has brought fear to the business community regarding how much data protection is in place. Supporting those fears are various reports that show the apparent lack of cybersecurity. However, organizations...
Blog Post

3 tips for being HIPAA-compliant in the healthcare industry

Art Post ·
HIPAA compliance can be tough. However, with a variety of data security worries on the minds of many, it has never been more important, as the penalties for HIPAA violations are expensive. For instance, it cost two organizations nearly $2 million...
Blog Post

How dentists should comply with HIPAA

David Bailey (Guest) ·
Dentists should ensure their methods of HIPAA compliance are up to date. According to Dentistry IQ, all positions within the dental field have to know how to approach the legislation, including receptionists, assistants, dental hygienists and IT...
 
×
×
×
×
×