Category: Uncategorized
Cybersecurity: Its Landscape and What you can do about it
Posted onWhether it is the targeted exploitation of corporate databases by state-sponsored groups, or the lack of judicial oversight on “warrants” issued by the National Security Agency, leaders are seeking solutions in response to the cybersecurity highlights of 2014. Thus far, the status quo response has been to develop reactive, check-the-box, risk management procedures. The current […]
Law Firm’s Relationship with Seattle Public Schools ‘Severed’ Due to Unauthorized Release of Student Information
Posted onFor years now, I have spoken with colleagues in the legal profession over the necessity of implementing a data governance program for their law practice. The overwhelming response, to date, is one that most would probably not expect from practicing lawyers who have an ethical duty to keep client information confidential – that being one […]
White House Does Not Know ‘For Sure’ Why Cyber-attacks Occur
Posted onOctober in the technology world is “cyber-security awareness month” (can’t believe I just wrote that). Yet, with all the awareness that popular media outlets like The Wall Street Journal, The New York Times, 60 Minutes, et al, bring, little in the way of solutions is being offered – which goes to the extent of how serious […]
FBI Announces Public Service Announcement On ‘Corporate Espionage’
Posted onThe Federal Bureau of Investigations announced a public service campaign today to bring attention to the $13 billion dollars in lost trade secrets to U.S. businesses by way of state-sponsored organizations and organized-criminal elements. In February, 2012, five companies and individuals were charged with economic espionage and theft of trade secrets for their role in […]
Businesses Beware: Point-of-Sale Hacking An Enormous Threat This Holiday Season
Posted onA “Point-of-Sale” (POS) terminal is the hardware and software used by retailers during the checkout process of its respective customers. Just like any technology-interfacing device, POS terminals are, and have been, subjected to fraudulent activities. Recent trends point to hackers accessing the information stored on these devices to commit widespread fraud throughout the United States and […]
Putting Patient Records Online: Do the Incentives Account for the Risks?
Posted onIn The New York Times today, Steve Lohr wrote an article about how the drive towards making patient records available online has taken a huge step forward by a major New York regional hospital group, North Shore-Long Island Jewish Health System. The group plans on offering its affiliated doctors subsidies of up to $40,000 […]
Electronic Health Care Records Are Slowly Being Adopted
Posted onIn today’s Technology Section of The New York Times, columnist Steve Lohr wrote an article entitled "Most Doctors Aren’t Using Electronic Health Records." The article explored the disconnect between large health care providers, like Kaiser Permanente, the Mayo Clinic, the Cleveland Clinic, who have fully integrated the use of electronic health care records into […]