Kardon Blog

Security & Privacy News

Keeping you informed and enlightened.

Danger, Will Robinson!

Have you read the FBI Cyber Division warning to the healthcare industry?  There really isn’t anything surprising in there to many of us who work in the medical industry.  The report itself kind of acknowledges it will fall on deaf ears. Hence the title of this article...

read more

So, I was checking my crystal ball…..

I needed to write an article and was looking for ideas and figured the crystal ball thing worked so well I should check it again.  Really, no, I didn’t use one but it sure felt like it when I read the notice published about the Baylor Medical Center’s breach. Baylor...

read more
Are your BAs hiring Gilligan, Gomer, or Barney?

Are your BAs hiring Gilligan, Gomer, or Barney?

It is becoming increasingly apparent that Business Associates should be taking their responsibility more seriously than they have in the past.  Although, the past could be in previous years or, for some, just yesterday.  The recent settlement of the class-action...

read more
Add More To Your HIPAA Heartbleed Review List

Add More To Your HIPAA Heartbleed Review List

Just as I mentioned in my earlier post on Heartbleed, there would be more to come.  Just hours after finishing that article I was reading the latest articles on the status of the situation.  This thing seems to get worse every day to many people.  I am not as shocked...

read more
Heartbleed HIPAA Documentation

Heartbleed HIPAA Documentation

If you haven’t considered your HIPAA requirements for Heartbleed yet you should probably get started sooner rather than later.  If you don’t run a site that needed a patch you almost certainly use one or more on a regular basis.  This is a perfect time to create nice...

read more
5 Tips to Just Get Your Risk Analysis Done

5 Tips to Just Get Your Risk Analysis Done

Doing a Security Risk Analysis is high on many lists right now.  Not only is it the number one thing OCR has defined as not being done properly, but it is also a required element for Meaningful Use attestation.  We have been getting a lot of traffic to our Risk...

read more
Breach Is Gonna Get You!

Breach Is Gonna Get You!

Gamblers spend years and fortunes trying to “beat the odds” often to no avail.  They know they are taking a major risk but they are looking for the big payoff.   If you are a numbers person, you boil things down to statistics or dollars and cents.  Those numbers help...

read more
Does XP swan song affect your HIPAA compliance?

Does XP swan song affect your HIPAA compliance?

We started working with our clients on replacing XP machines in their technology plans in 2013. No one is surprised when we come calling for the last few they have installed in 2014.  They have been hearing we were removing them for a long time.  But, not everyone has...

read more
Who is Phishing for your PHI?

Who is Phishing for your PHI?

An email arrives in your inbox tomorrow from someone working at one of the large insurance companies.  It tells you that someone has attempted to make changes to your information on their systems.  It is very specific because it uses your name and says they feel...

read more
HIPAA Penetration Testing?

HIPAA Penetration Testing?

Being an IT company that specializes in HIPAA compliance we get a lot of interesting inquiries that leave us scratching our heads.  HIPAA penetration testing is one of the areas.  We get an inquiry to perform penetration testing for a new customer.  Almost always the...

read more

No Better Time to Get Started

Privacy and security programs require persistent care and monitoring. There will never be a better time to get started.