- Phishing Campaign Linked with “Dyre” Banking Malware
- Crypto Ransomware
- SSL 3.0 Protocol Vulnerability and POODLE Attack
- GNU Bourne-Again Shell (Bash) ‘Shellshock’ Vulnerability (CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277 and CVE 2014-6278)
- Just because your company's spam filter, virus filter and other defenses let an email through, doesn't mean it's harmless
- Hackers aren't the only threat to your computer
- Use Google's cached mode to avoid spyware
- Be skeptical and trust your instincts
Health Insurance Portability and Accountability Act
With regards to information security, HIPAA sets requirements for the privacy, protection,m and notification of breaches of personal healthcare information, or PHI.
What information is protected?
"individually identifiable health information", which means…
"'Individually identifiable health information' is information, including demographic data, that relates to:
- the individual's past, present or future physical or mental health or condition,
- the provision of health care to the individual, or
- the past, present, or future payment for the provision of health care to the individual,
- and that identifies the individual or for which there is a reasonable basis to believe it can be used to identify the individual. Individually identifiable health information includes many common identifiers (e.g., name, address, birth date, Social Security Number).
HIPAA sets requirements for the covered data elements that must be protected (above), a set of standards for protecting these data (covered under the Safeguards rule), and the requirements for who and how notifications must be made in the event of a disclosure of PHI.
For more information, visit the U.S. Department of Health & Human Services HIPAA resources on the web.