Network Infrastructure

By Rick Kam 09:49 am November 16, 2015
While cyber-attackers are becoming ever sophisticated at stealing information from business systems, gaining entry into those systems is relatively easy because employees, vendors and sometimes customers are not very sophisticated at keeping them secure.
By Nathan Wenzler 01:21 pm October 29, 2015
In 2015, it seems like barely a month goes by without another report of a data breach suffered by a healthcare organization exposing personal information about patients or employees. Here's to a better 2016.
Padlocks and computer code
By Rick Kam 08:28 am October 19, 2015
The days of James Bond and his world-saving exploits are over. In today's reality, nation-states and their criminal partners can disrupt commerce and defenses in the free world from the safety and comfort of their computer desks.
By Rick Kam 10:03 am October 05, 2015
Most people navigate the World Wide Web via well-known search engines such as Google or Bing. Underneath the publicly accessible web, however, is the "Deep Web," the part of the web that is not indexed by common search engines.
By Tim Cannon 10:36 am August 25, 2015
Facing a new EHR implementation is like facing the bogeyman of health IT. Transition to a new system can be a nightmare. But as technology advances, such a move can be a necessity. These folks can help.
By Deborah Galea 09:12 am August 12, 2015
Given that healthcare organizations must sometimes exchange sensitive patient data with external parties, how can they ensure that this is done safely, protecting patient privacy and complying with HIPAA requirements?
By Rick Kam 09:26 am July 30, 2015
The dangers of data breach make for great headlines: data held for ransom, financial fraud, medical identity theft. But despite the risks of a breach, the most immediate threat in most security incidents is failure to comply with regulatory requirements.
By Pamela Bartz 01:58 pm July 21, 2015
As providers gain value from the digital revolution, most can't reach ultimate integration nirvana due to data silos and disparate systems. Data virtualization enables hospitals and health systems to create a more agile information architecture.
By John Trader 11:37 am July 13, 2015
As more healthcare organizations employ cloud software-as-a-service solutions to leverage their elasticity, scalability and ease-of-access, questions arise as to how these systems actually work and whether their effectiveness and feasibility translates into tangible investment potential.
data security lock
By Kurt Hagerman 10:28 am July 07, 2015
Many organizations do a decent job of limiting access to data and systems for their general user population. When it comes to privileged access, however, most simply attempt to limit who has this type of access without considering some inherent risks.

Most Read

The Daily Brief Newsletter