News
Do I Really Need Disk Encryption As A Covered Entity Under HIPAA?
In a word, yes. HIPAA section 164.308 requires covered entities to “implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level.” Is it reasonable to have employees potentially leaving unencrypted laptops in the back seats of taxi cabs with private data on them? Of course not! The scenario of stolen,…
Read MoreChief Information Security Officer (CISO) CISO-As-A-Service
Join us for a discussion on the role of a Chief Information Security Officer (CISO) and the option of outsourcing the CISO role (CISO as a Service). Moderated by Daniel J. Haurey, President, Exigent Technologies with guests, Cybersecurity Regulatory Consultant, Jeff Miller, and Michael Feldman, Esq., OlenderFeldman LLP. Some of the regulations mentioned include HIPAA,…
Read MoreCybersecurity For Hospitals
Hospitals are faced with the following challenges: Ad-hoc IT environments – Technology that is ordered by IT, clinicians, and administrators Internal politics – Finance, IT, human resources, and medical departments all have their own priorities and are competing for budget dollars for their own agendas Regulatory pressures – Regulation from CMS and HHS is ever-increasing…
Read MoreWelcome, Bruce Cheney!
Join us in welcoming our newest addition to the team, Bruce! Bruce will be taking on the role of Senior Cybersecurity Analyst. In this role, Bruce will be providing penetration testing and vulnerability assessment services, and much more!
Read MoreBecoming A Channel Partner Has Its Perks!
We like to welcome our new channel partners with a little taste of Cyberstone! If you are interested in becoming a partner and getting a real return on investment, contact our Channel Program Manager today! Jeff Miller jmiller@cyberstonesecurity.com 518.292.6568
Read MoreAre You A Physician Who Accepts Medicaid Payments? Cyberstone Can Help You Save Money Through MACRA/MIPS
MACRA stands for Medicare Access and CHIP Reauthorization Act. It was signed by President Obama in 2015. It combined a few different Medicare programs into one called the Merit-based Incentive Payment System (MIPS). MIPS is a program that allows the following group of Eligible Professionals (EPs) to get Medicaid “payment bonuses” based on quality, resource…
Read MoreNetwork-Based Bit-Flipping Vulnerability Allows For Kernel-Level Access
It’s been three years since the introduction of rowhammer, a technique of bypassing memory isolation protection mechanisms to flip bits in memory. This attack occurs when a hacker gains code execution privileges on a local system and then rapidly writes and rewrites memory to force capacitor errors in DRAM. This corruption of memory contents can…
Read MoreSpectre Returns
By now, most people have heard about Spectre, a security vulnerability present in just about all modern-day processors, namely AMD and Intel. If you wish to understand this vulnerability in more detail, you can do so at https://spectreattack.com/spectre.pdf. But these vulnerabilities have been fixed, right? Well, yes, there are indeed OS, browser, and firmware updates that…
Read MoreDid You Know All 50 States Have Mandatory Security Breach Notification Laws?
Did you know all 50 states have mandatory security breach notification laws? Even beyond industry and federal regulations, companies need to be prepared to answer state-level entities if they’ve been breached. Thanks to the National Conference of State Legislators, we have a hyperlinked list of the breach notification laws by state: view here. Categories:
Read MoreCyberstone Helps Companies With GDPR Cybersecurity Requirements
GDPR compliance is a bear. Let’s face it. However, like anything else in life, if you whittle it down into more manageable chunks, it doesn’t have to be nearly as daunting. Cyberstone helps companies with the cybersecurity requirements under Article 32 which include: GDPR Requirement Cyberstone Service “ensure a level of security appropriate to the…
Read More