Subscribe       Feed   All Posts     Search by Topic:

HIPAA Expected to be Strengthened "Within Months if Not Weeks"

It was reported from last week’s HIPAA conference, sponsored by OCR and the National Institute of Standards and Technology, that the final rule that will strengthen HIPAA privacy and security safeguards will be released by the end of 2011.  Sue McAndrew, deputy director for health information privacy at the Office of Civil Rights in the Health and Human Services Department, went so far as to say:

Accellion in Action: HIT Entertainment's Enterprise Deployment

When you think of Barney, Bob the Builder and Thomas the Tank Engine, enterprise software isn't usually the first thing that comes to mind, but today Accellion announced that the company behind these widely cherished children's entertainment brands, HIT Entertainment, has implemented a virtual, enterprise-wide deployment of Accellion Secure File Transfer.

The press release goes on to detail:

From Network World: Microsoft security expert warns over SharePoint data at risk

Robert Mullins’ Network World blog entry warning that SharePoint data might be at risk comes as no surprise.  Customers have come to us for a way to extend the file sharing functionality of SharePoint securely beyond the firewall for the last few years.

What was most interesting is the research done by Randy Franklin Smith of Ultimate Windows Security.  The company’s survey showed that:

What we can learn from our friends in the Government

Reports from the team who attended GovSec in Washington DC highlighted that there is a lot to be learned from the government sector.  Based on recent conversations, it seems to me, government IT organizations are among the most risk averse of all industry sectors.  Risk adverse organizations are:

How Much Protection Do My Documents Need?

I recently had an opportunity to watch race car driving live at Infineon Raceway in Sonoma. If you’re a car enthusiast like me, nothing is more exciting than seeing hot sports cars driving fast on a track. Drivers are continually trying to outmaneuver each other to gain position and push their own driving abilities to the limit.

Forget the iPod, who wants a cassette deck?

Last weekend marked the 40th anniversary of the introduction of the File Transfer Protocol (FTP). While FTP certainly isn’t pretty to use, it has served a purpose.  Originally designed to enable programmers to move files between systems, FTP has continued to serve that purpose nobly for the past 40 years.

However IT departments who have used FTP as the basis for employees to share files across the enterprise, have had less successful results.

If a tree falls in a forest, and no one hears it, does it make a sound?

If a tree falls in a forest, and no one hears it, does it make a sound?  Or the file sharing equivalent – if an employee uses a free personal file sharing account, and IT doesn’t know about it, does it still present a security risk?  You bet it does.

The Data Breach that Keeps on Giving

The Epsilon data breach of last week keeps on giving, with millions of email notifications being sent out from the companies affected, informing recipients of the incident.  The New York Times has weighed in and made recommendations for Congress to address this type of failure for consumers with an editorial “Who Really Sent That E-Mail?”

Let's Not Forget - Individuals Collaborate, Not Enterprises

We should all thank Corinne Schmid at CMSWire for reminding us of the central role that employees play in Enterprise Collaboration. Far too often articles on collaboration focus on business benefits derived from collaboration, rather than the efficiencies gained by individuals. But the fact remains that if:

Enterprise Collaboration is a journey, it is used to reach a destination by its drivers – Employees.”

Top Ten Reasons You Need Secure Collaboration

10.  Your company has already had a data breach. Don’t make the same mistake twice.  According to a recent survey by McAfee, only half of the companies who have had a data breach or attempted data breach, have taken steps to remediate and protect systems for the future.


Subscribe to RSS - blogs