1.888.749.9800

News & Events

HIPAA audit preparation and compliance: BA effects on CEs

Author Name Nicole Freeman   |   Date March 10, 2014

While the timetable for 2014 HIPAA audits has not been released, the Office for Civil Rights (OCR) has begun surveying covered entities and business associates (BAs) to gauge organizational preparedness for the upcoming OCR HIPAA Audit Program. The audit criteria have not been disclosed, but it’s possible that OCR will follow up […]

By |March 11th, 2014|HIPAA Compliance, News & Events|Comments Off on HIPAA audit preparation and compliance: BA effects on CEs
  • Permalink Gallery

    Expert Advice on the Pros and Cons of Developing a BYOD Policy – Commentary by Paul Hill

Expert Advice on the Pros and Cons of Developing a BYOD Policy – Commentary by Paul Hill

December 4, 2013 — Mobile Fever

As BYOD becomes more acceptable in the workplace, the concerns of IT leaders continue to grow. We interviewed 22 mobility and BYOD experts to provide some pros and cons around implementing and developing an Enterprise Mobility BYOD strategy. (Click here to see comments from other 21 consultants – http://bit.ly/18lWT7y)

Paul B. Hill, Senior Consultant, SystemsExperts

Paul B. […]

By |December 4th, 2013|News & Events|Comments Off on Expert Advice on the Pros and Cons of Developing a BYOD Policy – Commentary by Paul Hill
  • Permalink Gallery

    A Tale of Two Browsers: Chrome v. Chromium – Commentary by Paul Hill

A Tale of Two Browsers: Chrome v. Chromium – Commentary by Paul Hill

November 26, 2013 — LINUX Insider

Chrome or Chromium more secure? Numerous security experts place their bets on Chromium, suggested Paul Hill, a senior consultant at SystemsExperts. “Chrome’s code has to be able to tie into Flash Player, for instance,” Hill explained. “So more code is involved to integrate with other third-party products. This all introduces more complexities and more […]

By |December 3rd, 2013|News & Events|Comments Off on A Tale of Two Browsers: Chrome v. Chromium – Commentary by Paul Hill
  • Permalink Gallery

    10 Pitfalls of IT Risk Assessment — Commentary by Brad Johnson

10 Pitfalls of IT Risk Assessment — Commentary by Brad Johnson

October 17, 2013 — Dark Reading

As IT organizations seek to make better risk-based decisions about security practices, perhaps the No. 1 component for success is the IT risk assessment. However, even when organizations actually conduct a risk assessment, they frequently fall prey to mistakes that can greatly devalue the exercise. Here are some of the most common blunders to […]

By |October 18th, 2013|News & Events|Comments Off on 10 Pitfalls of IT Risk Assessment — Commentary by Brad Johnson
  • Permalink Gallery

    Insurance exchanges’ IRS Publication 1075 data compliance new to many – Commentary by Jeff VanSickel

Insurance exchanges’ IRS Publication 1075 data compliance new to many – Commentary by Jeff VanSickel

October 2013 — SearchHealthIT – TechTarget

Affordable Care Act implementation continues, despite some major obstacles: a government shutdown, deep political opposition to the ACA, and a rocky start to the first week of enrollment for its health insurance exchanges (because of initial crashes of the main federal website and ongoing technical glitches causing delays and user-authentication problems).

Mandated by the ACA, […]

By |October 17th, 2013|News & Events|Comments Off on Insurance exchanges’ IRS Publication 1075 data compliance new to many – Commentary by Jeff VanSickel

Defcon21 – Attended by Alex Chaveriat

August 2, 2013, 9:30 AM

CTP Comptition area (section 6), Rio Hotel, Las Vegas, NV
Alex Chaveriat , SystemExperts Consultant, featured speaker – Topic: “Packet Pwning”

By |August 2nd, 2013|News & Events|Comments Off on Defcon21 – Attended by Alex Chaveriat
  • Permalink Gallery

    10 BYOD Lessons For Business from Higher Ed – Commentary by Paul Hill

10 BYOD Lessons For Business from Higher Ed – Commentary by Paul Hill

August 1, 2013 — InformationWeek

The BYOD, or bring your own device, phenomenon is taking businesses by storm — and sometimes by surprise. But higher-ed IT departments have been dealing with BYOD for years now. In fact, they have a thing or two to teach the business world about effectively managing and securing an ever-changing mix of user-owned devices.

By |August 1st, 2013|News & Events|Comments Off on 10 BYOD Lessons For Business from Higher Ed – Commentary by Paul Hill

6 Apps Your IT Guy Hates – Commentary by Paul Hill

June 24, 2013 — Inc.

Do you count on these apps for everyday business tasks? Maybe you shouldn’t.

The amazing thing about mobile apps, cloud storage, and living on the Web is that information is always at your fingertips. Unfortunately, often that means your data is not far from hackers’ fingertips as well.

Here’s a round-up of the high-risk apps that could […]

By |June 24th, 2013|News & Events|Comments Off on 6 Apps Your IT Guy Hates – Commentary by Paul Hill
  • Permalink Gallery

    How to Keep Patient Information Confidential in the Digital Age – Commentary by Jeff VanSickel

How to Keep Patient Information Confidential in the Digital Age – Commentary by Jeff VanSickel

May 10, 2013 — SurgicalAesthetics

Medical practices across the nation are increasingly using digital tools to track patient health records, communicate with patients and collaborate across clinical specialties. But with the rewards of convenience and efficiency come the threats of potentially compromising patients’ privacy and exposing sensitive data to hackers or identity thieves.

Digitization is a fast-growing trend. About 30% of […]

By |May 10th, 2013|News & Events|Comments Off on How to Keep Patient Information Confidential in the Digital Age – Commentary by Jeff VanSickel
  • Permalink Gallery

    Companies get tough as gadget risks spike – Quotes by Paul Hill

Companies get tough as gadget risks spike – Quotes by Paul Hill

April 19, 2013 – Boston Business Journal

Mary K. Pratt, Special to the Journal

Steve Snyder, the chief information officer for the Massachusetts Convention Center Authority, knows the workers in his organization cover a lot of ground on a typical day. So he equips them with iPhones and iPads, allowing them to work as they move around the MCCA’s 1.7 million […]

By |April 19th, 2013|News & Events|Comments Off on Companies get tough as gadget risks spike – Quotes by Paul Hill
  • Permalink Gallery

    Paul Hill of SystemExperts on BYOD’s Impact on Workplace Training

Paul Hill of SystemExperts on BYOD’s Impact on Workplace Training

April 8, 2013 – Training Station

As part of a series of articles on this blog we started last month on the impact of BYOD (Bring Your Own Device) policy is having on workplace learning and development, I spoke recently with Paul Hill, Senior Consultant for SystemExperts, an important network security consulting firm.

Paul Hill has worked with SystemExperts as a […]

By |April 8th, 2013|News & Events|Comments Off on Paul Hill of SystemExperts on BYOD’s Impact on Workplace Training
  • Permalink Gallery

    How To Improve DBA And Security Team Relations – Quotes by Brad Johnson

How To Improve DBA And Security Team Relations – Quotes by Brad Johnson

April 3, 2013 — Dark Reading

If ever there were an “odd couple” tension of Oscar and Felix proportions within the IT operations community, it would be the mismatch between database administrators (DBAs) and the security pros tasked with managing risk on the data stores the DBAs keep humming. DBAs are “performance junkies,” according to John Kindervag, principal analyst for […]

By |April 3rd, 2013|News & Events|Comments Off on How To Improve DBA And Security Team Relations – Quotes by Brad Johnson
  • Permalink Gallery

    DBAs, security pros can learn to get along – Commentary by Brad Johnson

DBAs, security pros can learn to get along – Commentary by Brad Johnson

April 3, 2013 — FierceCIO

The ‘Oscar and Felix’ of IT must find common ground

Database administrators and security pros are integrally involved in securing data, but the two camps can seem like the “Oscar and Felix” of IT operations, writes Ericka Chickowski at Dark Reading. The two disciplines tend to approach data from different knowledge bases, backgrounds and goals, but […]

By |April 3rd, 2013|News & Events|Comments Off on DBAs, security pros can learn to get along – Commentary by Brad Johnson