More About the Author "brianw"

Author Nick: brianw
Site:


Articles by brianw :

Sort by:

Tips for Effective Regulatory Compliance Management

Regulatory compliance helps managing information security by meeting the regulatory controls  and reporting. Event logs systematically captured is an immense source of data for identifying and fixing vulnerabilities in the infrastructure and processes. Log management, therefore, becomes an essential arsenal  for compliance and is one of the many elements that contribute to efficient compliance strategies. […]

Work Anytime With Remote Desktop Appliances

The concept of “anywhere, anytime office” has gained momentum with the new age entrepreneurs. Along with this phenomenon applications such as remote desktops are now actively used and simultaneously given rise to desktop virtualization. To explain in simple terms desktop virtualization is a process that keeps the PC platform separate from a physical device to […]

Common Means of Data Breaches in Healthcare Industry

Today healthcare fraud is a multi-billion dollar industry. The recent surveys by two independent organizations further corroborate this fact. In its second annual Patient Privacy and Data Security benchmark survey, Ponemon Institute found that healthcare data breaches are on the rise despite compliance with HIPAA and the HITECH Act, eroding patient privacy, contributing to medical […]

Appliance-Based Remote Desktop Access For Better Security

Modern day mobile devices have an indisputable effect on today’s workforce. The business world has become faster paced and more globalized, with teams working together across multiple time zones and countries, and the conventional idea of regular working hours is fast becoming outdated. With mobile devices and mobile working are driving major changes in the […]

Understanding HIPAA Privacy and Security –Part III

In the first and second part of this article, we explored the privacy and security aspects of the Health Insurance Portability and Accountability Act or HIPAA. We delved upon the security rule and the three types of security safeguards namely administrative, physical and technical safeguards. Of the three safeguards, we had a look at the […]