Wilson Technology Group and More

Your One Stop IT and Telecommunications Firm


Leave a comment

10 Common HIPAA Violations

  1. All staff members are not assigned a unique identifier for system access
  2. Practice does not have in place policies and procedures to ensure an accurate and complete accounting of disclosures and a sample of your report to patients
  3. There is no documented confidential communications process in place
  4. The office does not have a documented list of all users (employees) with their job descriptions and level of access
  5. HIPAA required documentation is not kept for a period of 6 years (not to be confused with medical records)
  6. Lack of enforced sanctions policy
  7. You do not have a procedure, documentation or process for a patient filing a privacy complaint with the office
  8. Your staff did not apply Minimum Necessary standards
  9. Lack of yearly training of all employees
  10. your notice of privacy practices does not contain all the required disclosures

Where does your office fall in the above?

Wilson Technology Group is HIPAA CHP and CHSS Certified.

For more information on this and other topics , go to:  www.wilsontechgroup.com

Advertisements


Leave a comment

Botnet Propagation

Botnet operators, also known as “bot farmers,” use a variety of different methods to build their networks of bots.  Common methods include email viruses, Internet worms, drive-by-downloads of malware, Trojans distributed on portable storage devices, and more.  A case in point, a sweeping report about the Koobface botnet reveals how its architects infected more than 2.9 million computers.  The Koobface operators used social networking tactics on the world’s leading social network platforms – Facebook, Twitter, and MySpace – to spread the botnet malware.

Koobface primarily targeted Facebook.  Its main means of propagation was through fraudulent Facebook messages that enticed recipients to watch a video, such as an embarrassing video captured by a hidden camera.  Once users clicked on an embedded link in the message, they would be taken to a compromised site hosting the malware.  Then, when users tried to view the video, they would be instructed to update their Adobe Flash Player or download a new codec.

If users agreed to install the fake update, they would unwittingly download the Koobface malware.  Then when these users logged into their Facebook accounts, the Koobface malware would send malicious messages to a new hose of victims.

The techniques used to propagate Koobface are typical of the entire botnet industry:  viruses, worms, and Trojans spread through application and system vulnerabilities or social engineering tactics.

Visit http://www.wilsontechgroup.com for more information.

Taken from:  Imperva

 


Leave a comment

Significant Changes to HIPAA Effective March 26th, 2013

The following nine major changes will take effect on March 26th:

  1. Breach notification standard has been lowered
  2. Business Associate definition has been expanded
  3. Application of HIPAA to Business Associates has increased liability
  4. New requirements for Business Associates Agreements
  5. New requirements for notice of privacy practices
  6. Fundraising changes
  7. Expanded patient rights
  8. Increased flexibility with PHI of deceased patients
  9. Increased civil  monetary penalties

For more information on the above changes, go to:  http://www.jdsupra.com/legalnews/significant-changes-to-hipaa-effective-m-51197/


Leave a comment

Botnets Defined

What is a bot?  A bot is a software robot that automatically connects to command and control servers.  The command and control servers then instruct the bots to carry out illicit activity such as performing denial of service attacks, injecting “comment spam” on blogs and forums, or harvesting application content.  Building these networks of bots, or botnets, has become  a lucrative business tor botnet operators, who rent out their bots to the highest bidder.

Taken from:  Imperva:  Botnets at the Gate