Skip to content
Help Desk
  • Home
  • Information Technologies
    • Desktop Support & Management
    • Disaster Recovery (DR), On-Site & Off-Site Backups
    • Hardware & Software Sales
    • Help Desk, Onsite and Remote Support
    • Local Area Network (LAN) Installation & Support
    • PRO-Active Network Management
    • Server Support & Management
    • VoIP Telephony & Collaboration
    • Wide Area Network (WAN) Installation & Support
    • User Activity Monitoring
    • Managed Endpoint Detection and Response
  • Web Design & Development
    • Content, Messaging & Communication
    • Web Application Development
    • Website Design & Development
    • PRO-Active Website Management
  • Digital Marketing
    • Content, Messaging & Communication
    • PRO-Active Internet Marketing
    • Search Engine Marketing (SEM)
    • Search Engine Optimization (SEO)
    • Social Media Marketing (SMM)
  • Hosting & Cloud
    • Barracuda Virus & Spam Filtering
    • Offsite Backups
    • URL Filtering
    • Website, Email & Application Hosting
  • Computer Support
    • Backups & Recovery
    • Computer Repair & Service
    • Computer Sales & Service
    • esports
    • PRO-Active at Home

 

Intrada Technologies - Custom Solutions That Work

 

Help Desk
Contact Intrada
  • Home
  • About Intrada
  • Services
  • Knowledge Base
    • Thank You - Digital Marketing
    • Thank You - Multifactor Authentication
    • Thank You - Cybersecurity
    • Thank You - Virtual Events
    • Thank You - Microsoft 365
    • Thank You - Social Media
    • Thank You - Personal Identifiable Information
    • Thank You - Web Development
    • Thank You - Managed Service Providers
    • Thank You - Social Media Advertising for Business
    • Thank You - Google Analytics (GA4) - How the Update Benefits Businesses
  • Glossary
  • Careers
  • Home
  • Information TechnologiesRE-Active & PRO-Active
    • Desktop Support & Management
    • Disaster Recovery (DR), On-Site & Off-Site Backups
    • Hardware & Software Sales
    • Help Desk, Onsite and Remote Support
    • Local Area Network (LAN) Installation & Support
    • PRO-Active Network Management
    • Server Support & Management
    • VoIP Telephony & Collaboration
    • Wide Area Network (WAN) Installation & Support
    • User Activity Monitoring
    • Managed Endpoint Detection and Response
  • Web Design & DevelopmentAdaptive & Responsive
    • Content, Messaging & Communication
    • Web Application Development
    • Website Design & Development
    • PRO-Active Website Management
  • Digital MarketingSEO & SEM Strategies
    • Content, Messaging & Communication
    • PRO-Active Internet Marketing
    • Search Engine Marketing (SEM)
    • Search Engine Optimization (SEO)
    • Social Media Marketing (SMM)
  • Hosting & CloudLinux & Microsoft Solutions
    • Barracuda Virus & Spam Filtering
    • Offsite Backups
    • URL Filtering
    • Website, Email & Application Hosting
  • Computer SupportService & Repair
    • Backups & Recovery
    • Computer Repair & Service
    • Computer Sales & Service
    • esports
    • PRO-Active at Home
  • Home
  • Knowledge Base
  • David J Steele
  • How do you Rate your IT Security?

Knowledge Base

Home
Categories
Tags
Authors
Archives
Calendar
Categories:   All Categories
Suggested keywords
x
Search
Subscribe to blog
Unsubscribe from blog
  Print

How do you Rate your IT Security?

Information Technologies
David J Steele
Friday, 22 April 2016

The Monthly “Steal” by David Steele

The Monthly “Steal” is a bit of relevant technology information intertwined with personal thoughts, opinions and some real life experiences. It is written by David “Steele” and is free, hence a “steal” from a “Steele”.

206 Hospitals in 29 States were hacked effecting 4.5 million patient records in 2015. According to an article recently published in the Washington Post in February, a Los Angeles hospital paid $17,000 in bitcoin ransom to unload computer records.

 

“The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key,” Hollywood Presbyterian Medical Center CEO Allen Stefanek said. “In the best interest of restoring normal operations, we did this.”

Digital FingerprintBut hospitals are not the only target. JPMorgan Chase, Home Depot and Target were all victims of cyber-attacks in 2014.   It is no secret that personal information is valuable; the FBI released an article that indicated that in 2013, over 2 million health care records were compromised which was 31% of all reported data breaches. Cyber criminals are selling the information on the black market at a rate of $50 for each partial electronic health record (EHR), compared to $1 for a stolen social security number or credit card number.

What’s amazing is that most companies still don’t take cyber security serious or value the importance of properly securing customer data. Companies install door access systems, alarm systems, locked server racks and camera systems all focused on physical security, but when asked how they are securing their customer data, there is often a lack of detail. Most IT companies and computer professionals practice “General Network Management” or “Best Practices”. There are general guidelines that, when followed correctly, produce safe and secure computer networks. Where most companies struggle is how to confirm that best practices are being followed, usage policies are enforced and employees, IT staff and vendors are trained and held accountable.  

In 1996, the Federal Government created the Health Insurance Portability and Accountability Act – HIPAA. The primary goal of the law is to make it easier for people to keep health insurance, protect the confidentiality and security of healthcare information and help the healthcare industry control administrative costs. The Rule requires appropriate safeguards to protect the privacy of personal health information, and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization. HIPAA focuses mainly on medical and patient rights but the same requirements located under the HIPAA Security Rule provide a solid foundation and accountability to ensure “General Network Management” or “Best Practices” are valid and are providing a solid network environment. Before, IT companies would send a network technician and tell them to secure the network. Now, they send in a network technician and say this network needs to be HIPAA or Payment Card Industry (PCI) compliant providing both the IT company and the customer with accountability.

Many companies may say, “but I don’t deal with medical so why do I need to be so secured. When IT companies are hired, they are trusted with financial information, personal information and company information. By applying a HIPAA or PCI compliance requirement to your network will force vendors and staff to be more aware and involved in both the physical and function security of information. In most cases, the cost to properly secure and manage a network is a fraction of the cost associated with a data breach or privacy violation.

Hospital-Map_20160422-145801_1.jpg

Resources:

The Washington Post - February 18, 2015

Cyber Attacks on U.S. Companies in 2014 - By Riley Walters - October 27, 2014

David Steele, Partner / Webmaster

This email address is being protected from spambots. You need JavaScript enabled to view it.
570-321-7370
FacebookTwitterLinkedInGoogle+RSS Feed

Virus Alert: The Locky Virus
User Notice - Avoid Getting Caught in a Phishing S...

About the author

David J Steele

David J Steele

Subscribe to updates from author Unsubscribe to updates from author David J Steele

David Steele is the co-founder of Intrada Technologies, a full-service web development and network management company launched in 2000.  David is responsible for developing and managing client and vendor relationships with a focus on delivering quality service.  In addition, he provides project management oversight on all security, compliancy, strategy, development and network services.

Author's recent posts
More posts from author
Wednesday, 25 January 2023 Transforming Your Business’s Identity with Professional UI Website Design and Development
Thursday, 29 December 2022 What is Social Engineering?
Wednesday, 28 December 2022 Backups and Archives

Related Posts

Take Control of Your Business Data: Unlock the Power of Microsoft 365 SharePoint

Information Technologies

How Does SEO Benefit Your Company?

Digital Media and Internet Development

What is Social Engineering?

Procedures and Policies

Backups and Archives

Procedures and Policies

Take Your Productivity to the Next Level with Microsoft 365 Teams

Information Technologies

Tips to Help Protect Yourself from Credit Card Scams

Procedures and Policies

Contact Information:
  31 Ashler Manor Drive
  Muncy, PA 17756
 

Hours of Operation:
  Monday to Friday 8 AM > 5 PM EST
 

Get Directions
 800-858-5745
 
HELP DESK

OUR FOCUS

Intrada Technologies is a full-service web development and network management company with a focus on creating ongoing, trusted partnerships with each of our clients.

We make sure our clients have what they require to run their businesses with maximum efficiency and reliability, as many of their needs are mission-critical. 

Our unique, collaborative partnerships allow us to provide our clients with the assurance that we will be there when they need us.

CLIENT SERVICE TEAM

Quick Menu

  • Contact Intrada
  • Glossary
  • Help Desk
  • Knowledgebase
  • Services
  • About Intrada
  • Careers

Login

Intrada Secured Area for internal Staff resources.

  • Forgot your username?
  • Forgot your password?
Copyright © 2023 - Intrada Technologies - Privacy Policy

In order to provide you with the best online experience this website uses cookies. Delete cookies

Our website uses cookies and analytics to enhance our clients browsing experience. Learn More / I'm Good

Desktop Version
800-858-5745
Submit Ticket
Remote Control