Stern Warning From HIPAA Enforcer – Conduct Your Risk Analysis Or Else!

Stern Warning From HIPAA Enforcer – Conduct Your Risk Analysis Or Else!

The feds are coming, and they might be coming for you. That’s right, the federal regulators overseeing the healthcare industry in the United States are ramping up their HIPAA enforcement activities including their soon-to-be-relaunched COMPLIANCE AUDITS. The feds want medical clinics and business associates to heed this warning. Conduct your risk analysis and assessments or...

avatar
Duleep Pillai
October 6, 2014
Discover More
Stern Warning From HIPAA Enforcer – Conduct Your Risk Analysis Or Else!

Is Your Internet Browser Going BERserk?

Are you using Chrome or Firefox to browse the Internet? If so, IMMEDIATELY make sure you’ve got the latest updates for these Internet browsers. Why? A very dangerous security flaw has been identified that lets hackers and malware skip over the Secure Sockets Layer (SSL) of Google Chrome and Firefox. SSL is widely used security...

avatar
Duleep Pillai
October 1, 2014
Discover More
Stern Warning From HIPAA Enforcer – Conduct Your Risk Analysis Or Else!

Caution: Watch Out for Shellshock, the Latest Vulnerability That’s Spreading Rapidly & Could Potentially Be More Dangerous Than the Infamous Heartbleed!

A major vulnerability, CVE-2014-6271, has been spreading rapidly and impacting a wide range of businesses. CVE-2014-6271, also known as “shellshock,” impacts “bash” software, which is used in most business computers. According to some researchers, shellshock could potentially be more dangerous than heartbleed, the open/SSL bug that had most business owners in a state of panic...

avatar
Duleep Pillai
September 26, 2014
Discover More
Stern Warning From HIPAA Enforcer – Conduct Your Risk Analysis Or Else!

Security Warning: Your Computer Systems May Be at Risk for Exploitation Due to the Dangerous “Bash” Vulnerability!

A major high severity vulnerability, CVE-2014-6271, has been spreading quickly and impacting a wide range of businesses! The vulnerability, also known as “bash,” involves a UNIX type command shell that’s included in most distributions of Apple OS X and Linux. So how does the vulnerability work? An attacker is able to exploit the vulnerability, then...

avatar
Duleep Pillai
September 26, 2014
Discover More