Search results: md anderson

Cost of non-compliance: 8 largest data breach fines and penalties

| | General Security
Introduction Different regulations and laws will slap organizations with fines and penalties for data breaches. This is because the organization did not take the privacy of their data seriously. However, the authorities ...
HIPAA Compliance Checklist

HIPAA Compliance Checklist

Any organization that has access to electronic Protected Health Information (ePHI) must comply with HIPAA. If your organization needs to be compliant, this isn’t something you can delay or phase in gradually ...
5 Things Every MSP Should Know About HIPAA

5 Things Every MSP Should Know About HIPAA

| | Compliance, healthcare
There is no official “certification” in HIPAA recognized by the Federal government, therefore MSPs who work with healthcare providers or payers need to educate themselves on HIPAA compliance. Here are the top ...
Cancer Center Fined $4.3M for HIPAA Violations Involving Data Breaches

Cancer Center Fined $4.3M for HIPAA Violations Involving Data Breaches

A cancer center received an order to pay $4.3 million in a settlement for HIPAA violations that involved multiple data breaches. On 18 June, the United States Department of Health and Human ...
Guide to Mobile App Protection Against Bots & Online Fraud

Guide to Mobile App Protection Against Bots & Online Fraud

Safeguard your mobile app against harmful bots. Our guide provides step-by-step instructions on how to identify & prevent bot attacks & fraud on mobile apps for improved mobile app protection ...
Views from the top: CISO perspectives on the state of SaaS security

Views from the top: CISO perspectives on the state of SaaS security

|
A look back at the highlights, themes, and insights from Nudge Security’s “Overshadowed” interview series ...
USENIX Security '23 - How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic

USENIX Security ’23 – How The Great Firewall Of China Detects And Blocks Fully Encrypted Traffic

Authors/Presenters: Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow Many thanks to USENIX for publishing their outstanding USENIX Security ’23 ...
Exposing A Portfolio of Personally Identifiable Email Address Accounts from An E-Shop for Stolen Credit Card Details

Exposing A Portfolio of Personally Identifiable Email Address Accounts from An E-Shop for Stolen Credit Card Details

|
Dear blog readers,I've decided to share with everyone a recently portfolio of personally identifiable email address accounts known to belong to users of a popular E-Shop for stolen and compromised credit card ...
Impact of Technology Advancements on The Healthcare Cybersecurity Industry

Challenges to Healthcare Cybersecurity

| | Blog, CTI Strategies
Executive Overview The average cost of a data breach in healthcare in Canada is about 5.5 million CAD. Since delivering patient care depends on cybersecurity, securing healthcare systems and patient data is ...
HIPAA health care institutions

HIPAA Security Requirements: What They Really Mean

The University of Texas M.D. Anderson Cancer Center was having a hard time protecting patient electronic health information. In 2012, an employee’s laptop, containing ePHI for about 30,000 patients was stolen. The ...
Security Boulevard