Tag: Breach

Attack

Securing Billions of Smart Things

There are roughly 25 billion smart devices and objects busily gathering data and beaming information back to their respective motherships (and business partners).  That’s up from 7 billion things a mere five years ago. And five years from now? The consensus is 50 billion things will be interconnected, merrily gathering data, and making our lives easier/transforming the world into a marketer’s magic kingdom. The US Federal Trade Commission (FTC) has signaled its strong interest in bringing privacy enforcement to the so-called Internet of Things (IoT), with the release of its “voluntary standards” report this week.  We put those two works inside quotes because while the standards are voluntary right now, it’s a safe bet that they will be used in

Read More »
Audit

GET READY NOW FOR 2015 HIPAA AUDITS

A random audit program to gauge HIPAA compliance is expected to commence in early 2015. This round will include both on-site and off-site reviews. Your New Year will be happier if you start getting audit-ready now. We have provided you with tips below to make the process easier. Off-Site Audits Off-site audits focus on documentation reviews. These audits typically focus on one of the three mail HIPAA provisions – breach notification, security, or data privacy protocols. Documentation cannot be created after you receive the audit request, so review your policies and procedural documents to ensure they are current and comprehensive. Your documentation should cover the scope of your HIPAA compliance program and demonstrate how you have updated your policies and practices in

Read More »
Breach

TARGET CORP DATA BREACH ISSUE MAY BE SPREADING…

One of the largest retail hacks in the United States, the breach on Target caught the attention of the world. The event itself proved how common these types of attacks are no matter the size of an organization. Just recently, the restaurant chain P.F. Chang’s China Bistro found themselves in a similar position as Target. Unfortunately, they had been too late and the payments breach had taken place before they were able to discover any suspicious activity. The breach had led to payment card fraud and subsequent poor headlines for the chain. Once an organization has a breach it must spend a great deal of money to launch an investigation as to what happened. There’s a long list of negative

Read More »