Questions? Talk to a Real Person via our Live Chat
Physical Safeguards for HIPAA, Part 1:  Facility Access
By Gil Vidals, , HIPAA Blog

Physical Safeguards for HIPAA, Part 1: Facility Access

A recent, potential breach of protected health information (PHI) – including social security numbers, financial information, and medical data – was reported by a major health system in West Virginia. The cause? A stolen laptop, taken from an employee’s car. Despite equipping the laptop with security tools (including password protection), the health system failed to... Continue reading
OpenVAS – Open Vulnerability Assessment System
By Gil Vidals, , HIPAA Blog, Resources

OpenVAS – Open Vulnerability Assessment System

If you’re looking for an open-source software framework that is used for vulnerability scans and vulnerability management, the Open Vulnerability Assessment System (OpenVAS) is a first-rate tool. Developed by Greenbone Networks, OpenVAS is a framework of services and tools supported by an open-source community that promotes vulnerability analysis and management. OpenVAS can be downloaded as... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Top 3 Website Security Vulnerabilities

When performing a scan of your system servers, applications, and network devices, it’s not uncommon to see certain, predictable vulnerabilities showing up in the results. As each vulnerability represents a potential “weak spot,” or opening for attackers to penetrate and compromise your system, it’s important to be aware of them. The following represent the 3... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Blocking Foreign IPs

Cyber experts are noting a continuing increase in aggressive cyber attacks, with major players like China, Russia, Iran, and North Korea continuing to lead the way. The Ukraine and Brazil also represent growing threats in the cyber war. The motives behind these foreign IP attacks may include monetary gain, political agenda, or access to confidential... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Session Hijacking

Session hijacking is the use of a valid computer session to gain access to otherwise prohibited parts of a computer system. Specifically, session hijacking refers to the use of a cookie to authenticate a user to a network that is breached. In this way, the attacker can use that cookie to trick the server into... Continue reading
Skip to content