It’s that time of the year again – summer! Everyone is out enjoying the warm weather, going to the beach or, for all you bookworms, getting a jumpstart on your summer reading list. I can remember at the end of each school year my teachers would send me a long list of books to read over the summer months to keep my brain fresh for the following September. I thought it would be a good idea to put together a
As we pack our bags and prepare for HIMSS19 in Orlando, I
started to think about all the touchpoints where data and information can be
comprised when traveling. Even though travel and healthcare are two very
different industries, they both have multiple consumer touchpoints where
security can be compromised. Let’s take a look at what healthcare can learn
from traveling to HIMSS19.
Booking Your Flight
Today, most of us go online to book our flights and hotels
rooms. In just a few clicks, we can choose our
Thanksgiving not only marks the start of the holiday season – it’s also a time to reflect on what you’re most thankful for. As a security officer, I am thankful for all the payment technology that helps prevent data breaches in healthcare and that make processing payments secure and convenient. I can pay where I want, how I want and when I want, all with confidence that my information is protected.
What piece of the security pie are you thankful for
The year 2008 brought new technology innovations that redefined today’s consumer. Of course, with all new innovation comes new malicious threats to the security of our information. Let’s take a look back at some of the highlights and lowlights of 2008 and see what healthcare can learn.
First Android Phone and Google App Store
On September 23, 2008, T-Mobile launched the G1 (HTC Dream), the first smartphone to use Google’s new operating system for mobile devices. One month later, Google launched the
There’s nothing like a summer evening baseball game: the smell of popcorn, the fun of eating Cracker Jack and the thrill of cheering for your favorite team. At InstaMed, we have a few teams we root root root for – the Philadelphia office cheers for the Phillies and in our Newport Beach office, their home team is the Los Angeles Dodgers. As for me, I support the Milwaukee Brewers. In light of the summer baseball season, I decided to put
November is a time to reflect and give thanks for all the good things in our lives. As a security officer, I am additionally thankful for accomplishments in the field of security and compliance that help us better protect payment data and prevent data breaches in healthcare. Around this time four years ago, we were not so thankful for the massive breach that affected Target stores and compromised the credit and debit card information of 110 million consumers – right
When you think of a hacker, what comes to mind? Do you picture someone dressed as a burglar sitting at a desktop computer in a dark room? If you do, then it’s time to reconsider that idea. For this month’s security focus, we’re going to talk about social engineering and how it turns the hacker stereotype on its head.
Social engineering is a non-technical method of human intrusion that relies on human interaction and often involves tricking people into divulging confidential
Welcome to the Security Corner
Welcome to the first installation of InstaMed’s Security Corner, a monthly blog feature discussing important topics in compliance and security with me, Noah Dermer. I came to InstaMed in 2015 to join the Security and Compliance team. Previously, I was the Chief Security Officer at Epic Systems, where one of my responsibilities was building security into Epic’s enterprise applications. As Security Officer at InstaMed, my goal is to support our security and compliance mission as well
Guest Blogger: Chris Seib, Co-Founder & CTO, InstaMed
Last week, I highlighted some common oversights by businesses when leveraging a private cloud that increase the risk of long-term data outages, and detailed the best practices and tips to use in discussions with current or potential vendor partners in order to protect your business. Below is Part 2 of this post, focusing on disaster recovery, business continuity and security.
Even with high degrees of local redundancy in a private cloud data center,