Giva Blog
Help Desk, Customer Service, Cloud & Security Insights, with a Side of Altruism!

Improving Information Security with IT Infrastructure Library (ITIL)

ITIL & Information Security & Protection

If your company is bewildered with the relationship between the IT Infrastructure Library (ITIL) and security, you are not alone. Protecting any information is a daunting task, but ITIL can help to bring you to the finish line.

Giva's article, How can IT Infrastructure Library (ITIL) improve information security?, recently published by betanews.com, elucidates why ITIL is a very effective way to cork any security holes, and details which specific processes are the best for the task.

Healthcare Cloud Security & Transparency Best Practices

Healthcare Cloud Security Best Practices

As of late, the healthcare industry has become the target to hackers trying to steal patients' private information such as social security numbers and health records. Now more than ever, healthcare organizations must do all they can to keep patient information secure. Using software in the cloud can provide many benefits, but with the sensitivity of healthcare records, organizations might be hesitant to move to the cloud. However, cloud software companies are rising to this challenge, making switching to using the cloud for health IT a more viable option.

[Read More]

Is Your Company a HIPAA Business Associate?

HIPAA Covered Entities & Business Associates

HIPAA laws concerning the privacy and security of health information are quite strict. Currently, business associates of HIPAA covered entities must also be HIPAA-compliant. Most businesses are aware whether or not their company is a HIPAA covered entity or not, but what about a HIPAA business associate? If you signed a HIPAA business associate agreement (BAA), defined here, then you are definitely a business associate. The following are some of the instances where there might be some questions:

[Read More]

Healthcare & HIPAA Data Breaches

Healthcare & HIPAA Data Breaches

The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996. Coming up on twenty years later, HIPAA is not a new concept, but there are some ongoing issues. In 2009, HIPAA was joined by the Health Information Technology for Economic and Clinical Health Act (HITECH). This additional legislature brought changes to how HIPAA is enforced and the penalties that HIPAA non-compliance incurs. The Department of Health and Human Services has an Office of Civil Rights (OCR) that is responsible for enforcing HIPAA. Non-compliance with HIPAA is most evident after a data breach. Healthcare systems that suffer a data breach are investigated by OCR and fined large amounts of money for HIPAA violations. Let us examine healthcare and HIPAA data breaches and what they mean for the businesses that experience them.

[Read More]

Pros, Cons & Reminders When Upgrading Your Operating System

Operating System Technology Update

The operating system (OS) in your device is as vital to it as your blood is to you. Without an OS, any device is essentially just a shell. Every new device that you buy comes with an OS, usually the latest version from the manufacturer you have selected. When you get the device, you get the OS. That is the good news. The question marks start appearing at the same time as the little pop-up window in the corner of your screen that tells you it is time to upgrade your OS. Here are some of the pros and cons of moving to the latest version of your OS.

[Read More]

HIPAA Protects More Than Healthcare

HIPAA Security & Data Protection

Worried about protecting the information with which customers trust your company? Afraid that a data breach is inevitable if your company transitions to a cloud-based system? With the stringent requirements in healthcare IT, some cloud providers are HIPAA compliant. But, this can not only be good for healthcare IT systems, but any company can benefit from these extra levels of security compliance.

[Read More]

Top 5 Issues Facing Hospital CIOs Today

Technology Challenges for Healthcare/Hospital CIOs

Technology, such as cloud computing, is becoming increasingly attractive in the healthcare management industry. Hospital CIOs, however, now face the difficult task of optimizing new technology while still maintaining the healthcare industry's ethical standards. Here are the top five challenges faced by Hospital CIOs in implementing new technology:

[Read More]

HIPAA Compliance Importance, Cloud Storage & Assessment Tool

HIPAA Compliance & Data Protection

With increasing data breaches happening every year at major companies like Kohl's, Abercrombie and Fitch, Cigna and Anthem, it is more important than ever to know if your company is HIPAA compliant or not. Federal law requires companies dealing with private health information, or any business that hosts this information on their servers, to be HIPAA compliant.

Even if your company does not need to comply with HIPAA regulations, it is a good idea to protect other sensitive information like credit card numbers and customer employment information as strictly as private health information. Anthem's data breach in March exposed the records of more than 80 million people, many of whom were not even Anthem customers.

[Read More]

HIPAA Safeguards

HIPAA Data Security & Data Breaches

In being just a little over halfway through 2015, still, this year's Identity Theft Resource Center (ITRC) Data Breach Report reveals that 424 data breaches have already occurred as of July 14. This partial year's breaches have exposed more sensitive customer information than last year's breaches. Now is certainly a prime time for companies to review their security measures they take to prevent being the victim data breaches.

[Read More]

Healthcare Data Breaches on the Rise

Healthcare Data Protection

Since the start of the year, over 92 million medical records have been affected by breaches of the healthcare industry. According to recent news in Forbes, these breaches can affect customers both financially and in a more personal way with the private medical history involved making them more vulnerable. The fraudster could actually receive medical treatment under the victim's identity in the end putting the victim at risk of later receiving wrong medical service based on someone else's health information. The possibilities of complications stemming from these breaches are endless.

According to the article, it used to be that the top cause for patient data loss was an employee losing a device or having it stolen, but more recently the medical information is being obtained through cyber attacks on major medical organizations including Anthem, Premera and Carefirst. Because financial services and retailers have become savvier about protecting customer data the cyber criminals are now targeting the healthcare industry. "In a recent FBI presentation, Kam [Rick Kam, president and cofounder of ID Experts] says that the agency said that it had seen health insurance information fetching a price of $60-$70 on the black market as opposed to less than a dollar for a Social Security Number." This should propel all of the healthcare industry to do all they can to make the protection of their customers' private information a top priority.

Giva's cloud software rises above the rest by being HIPAA compliant. For more in depth information on this very important benefit , please see 7 Key Elements of Giva's HIPAA-Compliant Cloud Help Desk Software for Electronic Health & Medical Records.

 

Newer Entires     1   2   3   4   5   6   7     Older Entries