Giva Blog
Help Desk, Customer Service, Cloud & Security Insights, with a Side of Altruism!

CISO Conferences and Summits in Canada for 2017

Customer Service Conferences & Summits in Canada

In an effort to assist our Canadian CISO clients, Giva has compiled a listing of upcoming 2017 conferences and summits. We hope this will be helpful to you!

[Read More]

Cyber Security Events in Canada for 2017

Cyber Security Conferences & Summits in Canada

In an effort to assist our Canadian business, Giva has compiled a listing of upcoming cyber security conferences and summits in Canada for 2017. We hope this will be helpful to you!

[Read More]

How A White Hat Hacker Helped to Avoid a Healthcare Security Disaster

White Hat Hacker Helping Healthcare Data Security

On December 29, 2016, Department of Defense subcontractor Potomac Healthcare was notified about the jeopardizing of more than 11 gigabytes of private data for healthcare workers employed by the U.S. military's Special Operations Command. The compromised files were discovered by white hat hacker, Chris Vickery, who uncovered a flaw in an unprotected remote synchronization service. Upon his discovery, Vickery notified Potomac Healthcare about the insecurity of its data, which contained information dating back to 1988, and included names, locations, Social Security numbers, salaries and assignment units for psychologists, nurses and other Special Operations Command workers, some of which had top secret clearances.

[Read More]

What Deloitte’s Poll Tells Us About Blockchain Technology Adoption

Blockchain Technology

Consulting agency, Deloitte, is reporting that the healthcare industry will begin to heavily implement Blockchain technology in 2017. Despite the uneven understanding of Blockchain, its possibilities as a distributed database are garnering popularity and adoption from multiple fields. The technology offers advanced security and data storage, as well as interoperability, which makes it an asset in the healthcare field. Health and life sciences are primed to be the two leading industries in Blockchain deployment going forward this year, with financing, manufacturing, media, and telecom services expected to follow suit.

[Read More]

What It Means To Be HIPAA Compliant

HIPAA Compliance

The Health Insurance Portability and Accountability Act (HIPAA) was established in the U.S. in 1996 to protect an individual's personal health care information. Healthcare institutions are required to meet all standards and comply with the appropriate security measures in order to safeguard patient data. These standards became enforceable by law on 21 April, 2005.

[Read More]

Healthcare Cybersecurity to be Highlighted at HIMSS17 Conference: Orlando, Florida, Feb 19-23, 2017

HIMSS17

Cyber security has become an important issue for healthcare organizations as attacks on the industry, and in particular on private patient information, have grown more prevalent. A timely opportunity to learn more about the current state of healthcare cyber security, as well as many other pertinent issues in healthcare, is coming soon. The Healthcare Information and Management Systems Society (HIMSS) is hosting their 2017 Conference and Exhibition from February 19th to the 23rd at the Orange County Convention Center in Orlando, Florida.

[Read More]

What is HITRUST vs. HIPAA?

HITRUST

The Health Insurance Portability and Accountability Act (HIPAA), which passed in Congress in 1996, outlines protection and security standards for health care data. Although this was passed twenty years ago, it is still very much relevant to companies today. A new acronym you may have heard recently is HITRUST, or the Health Information Trust Alliance. Many are under the impression that HIPAA and HITRUST are at odds with each other and fail to understand how the two are related.

[Read More]

Connected Medical Device Security to be Explained during February 8th, 2017 Webinar

HIMSS Connected Medical Devices Security Webinar

Security should be a top priority when it comes to protecting the most private information found on an organization's connected medical devices. Though as many of us know, in a world where cyber-attacks are becoming more prevalent, protecting this information is becoming far more challenging.

An opportunity to learn more about potential risks and protection of this particular technology is upcoming, when the "Connected Medical Devices: How Well are They Secured?" webinar begins on February 8th, 2017 at 12:00PM CT. It is a complimentary event hosted by Mayuresh Ektare, VP of product management for Silicon Valley startup ZingBox, and in association with The Learning Center powered by HIMSS.

[Read More]

HIPAA-Compliant Text Messaging and Why You Need It

HIPAA-Compliant Secure Text Messaging

Running a hospital presents a variety of unique challenges. It is like many other businesses as it requires effective leadership and communication to run smoothly, but the extra factor is the importance of timeliness. All businesses require quick employee response, but this could not be truer for a healthcare facility. Patients and their health can be unpredictable. There should be a method of reaching healthcare professionals in a timely manner while still protecting the sensitive information being transmitted.

[Read More]

Why This Producer of ID Cards Fell Victim to Data Breach

Newkirk & Healthcare Data Breaches

Newkirk Products, Inc., a company that produces ID cards for health-insurance plans reported a data breach earlier in 2016 involving unauthorized access to a server holding member information. The company reported that no social security, banking, credit card or medical data was stored on the breached server.

[Read More]

 

Newer Entires     1   2   3   4   5   6   7     Older Entries