Skip to main content

Tagged With "Trust"

Comment

Re: The Heavy Toll of Poor Data Security in Healthcare

tonyl ·
I am out of the office until 09/01/2014. I will respond to your message when I return. Note: This is an automated response to your message "Post By Art Post: The Heavy Toll of Poor Data Security in Healthcare" sent on 8/27/2014 8:12:05 AM. This is the only notification you will receive while this person is away.
Comment

Re: How dentists should comply with HIPAA

Keith Thompson ·
I am out of the office until 08/04/2015. I am away if you need to talk to someone please contact Darren Downey our GM Office 633-9264 X 226 Cell 204.229.7231 My Cell is 204.890.8570 Note: This is an automated response to your message "Post By David Bailey (Guest): How dentists should comply with HIPAA" sent on 4/1/2015 11:14:20 PM. This is the only notification you will receive while this person is away.
Comment

Re: What HIPAA does and how the healthcare industry has been complying

John Mooney ·
What's really comical is while MFP vendors are touting the great features of their HIPAA complaint systems, walk through a typical sales office and I guarantee you'll be able to find a lease with a personal guarantee and a person's SS# left out somewhere on a desk.
Comment

Re: Cybersecurity in healthcare - Why there needs to be more concern

Keith Thompson ·
I am out of the office until 12/02/2015. I am away untill Feb 12th if you need to talk to someone please contact Darren Downey our GM Office 633-9264 X 226 Cell 204.229.7231 Note: This is an automated response to your message "Post By Art Post: Cybersecurity in healthcare - Why there needs to b..." sent on 2/9/2015 10:52:41 PM. This is the only notification you will receive while this person is away.
Comment

Re: Email Security is Moving Into More Prominent Positions

HUNTER BUSINESS SYSTEMS ·
Art what time is good today I néed 20 m minutes steve Steve s iPhone > On Aug 4, 2014, at 4:54 PM, Print4Pay Hotel < alerts@hoop.la > wrote: >
Comment

Re: A Closer Look at Data Breach Avoidance & Response

tonyl ·
I am out of the office until 07/14/2014. I will respond to your message when I return. Note: This is an automated response to your message "Post By Art Post: A Closer Look at Data Breach Avoidance & Respo..." sent on 7/9/2014 9:07:01 AM. This is the only notification you will receive while this person is away.
Reply

Re: docSTAR(TM) Acquires DocuLex Document Management Product Suite From Protected Trust LLC

Art Post ·
WOW, I was surprised to see this! Protected Trust is one of our advertisers and they offer a variety of products that are available to the dealer channel. Looks like they mean business with Managed Services. Check them out here https://protectedtrust.com/Partners/
Comment

Re: Holes in a fence: How the approach to cybersecurity is changing

richj ·
I am out of the office on annual leave until the 26th Jan. In my absence please contact 01983 406522. Thank you
Comment

Re: Implementing basic cybersecurity in a small healthcare business

richj ·
I am out of the office on annual leave until the 26th Jan. In my absence please contact 01983 406522. Thank you
Blog Post

Healthcare - The Road Ahead for Patient Record Protection

David Bailey (Guest) ·
IT security has finally become a more central and critical priority among health care leaders in the past few years, and this could not have come soon enough given the immense volumes of records exposed of late. Identity theft has been the most...
Blog Post

As Mobility Spreads, Healthcare IT Security Must Be Enhanced

David Bailey ·
The healthcare industry has become a bit more mobile-centric in the past few years, driven by the need for agile, always-on operations that fit the preferences of both employees and clientele. When watching trends in the IT manufacturing sector, it has become clear that personal computers are likely to continue falling in shipments and investments, replaced by the adoption of and rising expenditures related to smartphones, tablets and portable computers. What's more, the mobility arena has...
Blog Post

The Continuing Issue of Reactionary IT Security in Health Care

David Bailey ·
Health care providers have been hot and cold with respect to protecting patient data of late, as many have made progressive moves to protect their systems and information, while others have lagged behind in this regard. Although retailers and others...
Blog Post

The BYOD Side of Health Care IT Security

David Bailey ·
In the past several years, plenty of trends in corporate IT have taken shape and intensified, but perhaps none quite as impactful and challenging as enterprise mobility. Sure, the Internet of Things is beginning to scale up and challenge managers in the IT department, but it will take years for this trend to see the same types of gains in adoption as enterprise mobility and, specifically, BYOD, have seen of late. Lost or stolen devices, rogue IT, poor control over access, no governance and...
Blog Post

At-risk data companies should know about

David Bailey (Guest) ·
In this modern technological age, disaster recovery plans are necessary for businesses. Cyberattacks have become unavoidable for all organizations, so companies need to prepare themselves for hard-hitting hackers and keep themselves on high alert....
Blog Post

How can healthcare organizations choose and use email encryption?

Art Post ·
Email Encryption has become an important asset for healthcare organizations in a world where cybersecurity is a necessity. Although it doesn't seem like the most fancy or complex protection tool, it can be an amazing resource for email...
Blog Post

Beyond the Breach: General Data Management Considerations

Art Post ·
Much of the news related to information governance has related directly back to security and data breaches in recent years, and for good reason as a wealth of organizations have fallen victim to theft and exposure in that time frame. First and...
Blog Post

Healthcare organizations at risk of Shellshock vulnerability

Art Post ·
Security threats are growing in abundance as more health organizations choose to host large quantities of patients' personal and medical information in data centers, locally and across the country. A recent study from McAfee discovered over 31 million...
Blog Post

Email is alive, well and evolving

Art Post ·
Email is a part of everyday life. It should come as no surprise, then, that it is widely used in corporate environments. Many believe that email will not be around for much longer due to the adoption of social media, text and instant messaging and...
Blog Post

Data breaches in healthcare costing millions

Art Post ·
The healthcare industry is undeniably a target of cybercriminals. With the increased usage of electronic health records, healthcare organizations have large volumes of data stored in data centers, on employee devices and sent through email. However,...
Blog Post

The Latest Health Care Breach Might Be the Worst

David Bailey (Guest) ·
Health care data breaches have been growing in frequency and subsequent damages for years now, while the vast majority of the events actually take place on a smaller scale among community providers. However, in the past couple of months, this has not...
Blog Post

Email security has transcended into ridiculousness

David Bailey (Guest) ·
While it is never good to make light of a serious situation such as IT security, businesses as well as health care providers and government agencies have been making it quite difficult to keep a lid on hilarity. That was meant to evoke "Hillary," in...
Blog Post

Health Care Still Struggling with Email Security

Art Post ·
The health care sector has come under fire of late due to an increased prevalence of data breaches, privacy failures and more, while many of the more damaging events have actually been the result of relatively simple mistakes. Although the retail...
Blog Post

Implementing basic cybersecurity in a small healthcare business

Protected Trust (Guest) ·
Big businesses like Sony Pictures Entertainment and Target have had information compromised by hackers, giving small business customers a reason to be wary. What can an enterprise do to implement cybersecurity and appeal to a hesitant audience? The...
Blog Post

How HIPAA may be affected by Obama's cybersecurity proposal

Art Post ·
President Barack Obama reiterated his goal to change cybersecurity in his State of the Union address on Tuesday. He hopes to accomplish more secure data through legislative modifications and his own cybersecurity proposal. However, healthcare...
Blog Post

Cybersecurity in healthcare - Why there needs to be more concern

Art Post ·
Cybersecurity has become a huge concern for the healthcare industry in more ways than one. Forbes reported that in 2011, Jerome Radcliffe, a diabetic, demonstrated how his wireless insulin pump could be hacked at a Black Hat cybersecurity conference....
Blog Post

3 tips for being HIPAA-compliant in the healthcare industry

Art Post ·
HIPAA compliance can be tough. However, with a variety of data security worries on the minds of many, it has never been more important, as the penalties for HIPAA violations are expensive. For instance, it cost two organizations nearly $2 million...
Blog Post

5 trends that will affect the Healthcare IT sector this year

David (Guest) ·
Trends are always affecting the healthcare IT community and this year looks no different with a variety of technological tools expected to become more popular. Cybersecurity is always important in regard to the cloud, the Internet of Things and big...
Blog Post

What HIPAA does and how the healthcare industry has been complying

David Bailey (Guest) ·
HIPAA, or the Health Insurance Portability and Accountability Act, has been a huge source of interest since cyberattacks became prevalent in the business world. Many people have argued that hackers will begin to focus on the healthcare industry, due...
Blog Post

How dentists should comply with HIPAA

David Bailey (Guest) ·
Dentists should ensure their methods of HIPAA compliance are up to date. According to Dentistry IQ, all positions within the dental field have to know how to approach the legislation, including receptionists, assistants, dental hygienists and IT...
Blog Post

5 Internet and secure email tips

Art Post ·
Hillary Clinton has certainly been under fire in the news recently for her insecure email usage. However, there are many strategies businesses can teach their employees and learn from Clinton's mistakes to ensure safe technology use in the workplace....
Blog Post

Two severe Windows vulnerabilities addressed, another two unpatched

Art Post ·
Windows users might have noticed that on the morning of Nov. 13, they were greeted with a large number of updates for their systems. This is all too common of a problem for IT departments as they scramble to patch servers, desktop computers and...
Blog Post

The past, present and future of cybersecurity

Art Post ·
Protecting enterprises with cybersecurity tools has been a long process, one filled with failed attempts, confusion and human error. Furthermore, many new infrastructure-as-a-service offerings are attempting to provide IT departments with high-levels...
Blog Post

Health care industry is No. 1 for cyberattacks

Art Post ·
The FBI has warned that cyberattacks are on the rise - and health care companies are often the target hackers seek. An attack that took place in August on Community Health Systems Inc., the No. 2 publicly traded U.S. hospital group, compounded concern...
Blog Post

Cybersecurity predictions for 2015 - Healthcare

Art Post ·
Cybersecurity has been in the news quite a lot over the past year given the breaches sustained by Sony Pictures and retail stores like Target and Home Depot. What kind of changes in cybersecurity are happening, and what can customers expect in 2015?...
Blog Post

The state of cybersecurity in the health care industry

Art Post ·
The health care sector should prepare for cybersecurity in 2015, as it's expected to become a huge target. Breaches within the sector can prove even more costly than those afflicting other industries, with HealthITSecurity reporting that such...
Blog Post

Holes in a fence: How the approach to cybersecurity is changing

Art Post ·
The Sony Entertainment cyberattack is not yet old news. On the contrary, the breach is still affecting the idea of cybersecurity and how important it is for organizations to have protection in place. The mystery of who was behind the attack on Sony is...
Topic

docSTAR(TM) Acquires DocuLex Document Management Product Suite From Protected Trust LLC

Art Post ·
SCHENECTADY, NY --(Marketwired - May 06, 2014) - docSTAR, a division of Astria Solutions Group LLC, an award-winning developer of cloud and on-premises enterprise content management software (ECM), announced today that it has acquired the DocuLex suite of document management products of Winter Haven, Florida-based Protected Trust LLC ( www.protectedtrust.com ). The asset acquisition will complement and extend docSTAR's existing ECM portfolio and installed base and will add more than 1,000...
Blog Post

A Closer Look at Data Breach Avoidance & Response

Art Post ·
Data breaches have become some of the more dangerous and frequent threats to corporate continuity in the past few years, as many organizations have struggled to either avoid or recovery from major instances of information loss and exposure. In many...
Blog Post

Data and Email Encryption get left behind

Art Post ·
The IT security community has faced a challenging, uphill battle when it comes to modern data and communications protection, especially as hackers become more diverse and complex in their tactics. Regardless of industry or region, virtually every...
Blog Post

Email Security is Moving Into More Prominent Positions

Art Post ·
Boardroom executives have had to be exceptionally agile when developing and releasing new forms of security controls for their information technology and communications frameworks, especially as the frequency of damage associated with breaches...
Blog Post

The Heavy Toll of Poor Data Security in Healthcare

Art Post ·
In what has become a farce of sorts, health care providers appear to remain far behind the learning curve when it comes to data, network and email security, as breaches have been on a torridly rising path in the past few months. Although retailers...
Blog Post

How Equipment Purchasing Trends Might Impact Corporate Security Strategies

Art Post ·
Businesses have been highly fluid in their technology spending throughout the past few years, driven by the need to keep up with the IT evolution so as not to fall behind the competition. Although personal computers are still being used in many...
Blog Post

In Focus: Two Latest Major Data Breaches

Art Post ·
A lack of knowledge can, and often will, cause significant issues in the fight to combat cybercrime, especially as hackers work in an opportunistic fashion - identifying vulnerabilities and capitalizing on them. Many might believe that data breaches...
Blog Post

In Focus: Email Security, Management

Art Post ·
In many instances, business leaders believe that email security is among the least of their concerns when it comes to data management and protection, focusing the entirety of their efforts on other communications tools, infrastructure components,...
Blog Post

Do Not Avoid the Cloud: Get a Managed Service and Capitalize

Art Post ·
Businesses continue to become more interested in the power of the cloud, though recent data breaches have appeared to reignite fears that this technology is simply impossible to secure. Although this should be common knowledge by now, cloud computing...
Blog Post

A Broad Scope of Health Care Data Security

Art Post ·
The health care security arena has become more complex and challenging in recent years, driven by all different types of stressors, pain points, new technologies, compliance overhauls and more. In many ways, patient information has been widely viewed...
Blog Post

A Roundup Of Recent Breaches, Subsequent Damages

Art Post ·
Data breaches have moved into the forefront of the public eye in the past year, driven by a consistent stream of new events that highlight just how behind the average organization is in preparation and defense strategies. Information exposure has...
Event

Legal Tech

Blog Post

When Will The Imaging Channel's Customers' Run out of Trust?

Ray Stasiezcko ·
It's is 2020 in less than 30 days. Yet some in the Imaging Channel still think its 2000. On the other hand, most of the channel's customers are excited about 2025 and will find vendor partners who can deliver 2025 today. "A company's customers won't be held hostage by those who serve them status quo; today's customers are presented or can find on their own replacements for what they deem obsolete." Customers are no longer at the mercy of those who currently serve them. The ability for an...
Comment

Re: The Continuing Issue of Reactionary IT Security in Health Care

Larry Kirsch ·
Nice article. Valuable information.
 
×
×
×
×
×