Anthem Blue Cross Data Breach: What you need to know about the health insurer’s personal information breach
Another Anthem Blue Cross data breach compromises personal information of millions. Anthem, which operates as Anthem Blue Cross in California and a variety of other brands in other states, announced Wednesday Feb. 4, 2015 that hackers had obtained personal information on million of its health insurance customers, including the CEO, Joseph R. Swedish. What did […]
Continue Reading...Best New Apps: Workflow for iOS
Workflow for iOS review: An awesome Mac-like app for our post-PC devices Our iOS devices aren’t built for efficiency. Unlike OS X, where we can simultaneously work in multiple apps and position windows and folders on our desktops for optimal output, iOS has a far greater focus on individual tasks. Even accomplishing something […]
Continue Reading...Windows 10 New Features: Cortana, a ‘Spartan’ browser, Xbox streaming, and more
It’s official: Windows 10 is coming to the people. After kicking off Windows 10 with a bevy of business-friendly features, Microsoft drew back the curtain on the operating system’s new consumer-focused features at an event last Wednesday, while simultaneously driving home a vision of an operating system designed to deliver a singular, cohesive experience across […]
Continue Reading...Data Hijacker Holds Patient Data Hostage
A critical access hospital in southern Illinois was targeted by holding PHI data hostage. The attacker was an unknown party with access to protected health information. This attacker also threatened to release more data unless a “substantial” ransom payment was made. The 22-bed hospital in Flora, Ill., notified its clinic patients that back on Nov. 2 there […]
Continue Reading...SSLv3 Poodle Security Breach
SSLv3 POODLE Security Vulnerability Breaks SSLv3 Secure Browsing When you access high profile sites and services such as your bank, Twitter or Google you typically access sites using https:// or a feature called SSL (secure sockets layer) but a new security defect could break that open. SSL or TLS (Transport Layer Security) provides encryption to protect […]
Continue Reading...Caution: If You’re Considering Office 365 Read Beyond the Fine Print
Office 365 is working great in Don’s shop, but there are issues you need to be aware of. He shares what he’s found out (so far). As more and more people switch to Microsoft Office 365 Software as a Service, program bugs will obviously present themselves. The original writer of this blog uses Office 365, and […]
Continue Reading...40 Apple iPhone 6 Plus and iPhone 6 tips and tricks
The Apple iPhone 6 and iPhone 6 Plus arrived with a splash and a huge initial sales success, but since they are such a huge upgrade over the smaller, 4-inch iPhone 5s, there is a ton of new features and little things that you can do to tweak the iOS 8 experience on Apple’s […]
Continue Reading...Shellshock is a new security threat worse than Heartbleed
The Health Information Trust Alliance has issued warnings about Shellshock, a system vulnerability it says could cause much more damage than the infamous Heartbleed bug. The HITRUST Cyber Threat Intelligence and Incident Coordination Center, known as the C3, announced this past week it has been tracking the remote code execution vulnerability, which it says can […]
Continue Reading...Warning: Breach of Patient Identification Information
On August 18, 2014 the United States Computer Emergency Readiness Team, US-CERT, issued an alert that there there was a breach of patient identification information. US-CERT is aware of a breach of sensitive patient identification information affecting approximately 4.5 million patients and customers of Community Health Systems, Inc. As part of DHS, US-CERT is working together […]
Continue Reading...Warning: New Point of Sale Malware Attack
On August 18, 2014 the National Cybersecurity and Communications Integration Center, NCCIC, and United States Computer Emergency Readiness Team, US-CERT, issued an alert that there is a new POS, Point of Sale Malware Attack. This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information […]
Continue Reading...