With the iPhone X and security in the news, organizations must address FaceID, password management, and information security compliance concerns.
Big Data in healthcare requires not only getting all the information but protecting it. Effectively using Big Data means ya gotta catch 'em all.
Just when you figured out how to negotiate the “business entity” definition, Congress hit you with the Omnibus rule. HIPAA and vendor management suddenly became “a thing.” Managing patient health information (PHI) feels like gathering evidence from a crime scene. Anyone who remembers the O.J. Simpson trial remembers the infamous bloody fingerprint. The sample of O.J. Simpson’s blood went missing during the police investigation. Only 6 ml of the 8 ml of the blood drawn from Simpson was accounted for, causing people to suspect evidence was planted. While HIPAA may not be as exciting as a high speed car chase, tracking your chain of evidence—or in compliance speak, chain of trust—matters. What is PHI? PHI incorporates multiple types…
Password management risks come in a variety of forms, but like a wall, moat, and gate there are multiple ways to protect your castle.
Compliance reporting metrics offer stakeholders a shared language for assessing compliance. ISO 27004:2016 provides guidelines for quantitative analysis.
Understanding SSAW 18 requirements means evaluating all the connections between your vendors, just as you would when playing Six Degrees of Kevin Bacon.