News

inner-icon

Do I Really Need Disk Encryption As A Covered Entity Under HIPAA?

April 24, 2019

In a word, yes. HIPAA section 164.308 requires covered entities to “implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level.” Is it reasonable to have employees potentially leaving unencrypted laptops in the back seats of taxi cabs with private data on them? Of course not! The scenario of stolen,…

Read More

Chief Information Security Officer (CISO) CISO-As-A-Service

April 24, 2019

Join us for a discussion on the role of a Chief Information Security Officer (CISO) and the option of outsourcing the CISO role (CISO as a Service). Moderated by Daniel J. Haurey, President, Exigent Technologies with guests, Cybersecurity Regulatory Consultant, Jeff Miller, and Michael Feldman, Esq., OlenderFeldman LLP. Some of the regulations mentioned include HIPAA,…

Read More

Cybersecurity For Hospitals

April 24, 2019

Hospitals are faced with the following challenges: Ad-hoc IT environments – Technology that is ordered by IT, clinicians, and administrators Internal politics – Finance, IT, human resources, and medical departments all have their own priorities and are competing for budget dollars for their own agendas Regulatory pressures – Regulation from CMS and HHS is ever-increasing…

Read More

Welcome, Bruce Cheney!

April 24, 2019

Join us in welcoming our newest addition to the team, Bruce! Bruce will be taking on the role of Senior Cybersecurity Analyst. In this role, Bruce will be providing penetration testing and vulnerability assessment services, and much more!

Read More

Becoming A Channel Partner Has Its Perks!

April 24, 2019

We like to welcome our new channel partners with a little taste of Cyberstone! If you are interested in becoming a partner and getting a real return on investment, contact our Channel Program Manager today! Jeff Miller jmiller@cyberstonesecurity.com 518.292.6568

Read More

Are You A Physician Who Accepts Medicaid Payments? Cyberstone Can Help You Save Money Through MACRA/MIPS

April 24, 2019

MACRA stands for Medicare Access and CHIP Reauthorization Act. It was signed by President Obama in 2015. It combined a few different Medicare programs into one called the Merit-based Incentive Payment System (MIPS). MIPS is a program that allows the following group of Eligible Professionals (EPs) to get Medicaid “payment bonuses” based on quality, resource…

Read More

Network-Based Bit-Flipping Vulnerability Allows For Kernel-Level Access

April 24, 2019

It’s been three years since the introduction of rowhammer, a technique of bypassing memory isolation protection mechanisms to flip bits in memory. This attack occurs when a hacker gains code execution privileges on a local system and then rapidly writes and rewrites memory to force capacitor errors in DRAM. This corruption of memory contents can…

Read More

Spectre Returns

April 24, 2019

By now, most people have heard about Spectre, a security vulnerability present in just about all modern-day processors, namely AMD and Intel.  If you wish to understand this vulnerability in more detail, you can do so at https://spectreattack.com/spectre.pdf. But these vulnerabilities have been fixed, right? Well, yes, there are indeed OS, browser, and firmware updates that…

Read More

Did You Know All 50 States Have Mandatory Security Breach Notification Laws?

April 24, 2019

Did you know all 50 states have mandatory security breach notification laws? Even beyond industry and federal regulations, companies need to be prepared to answer state-level entities if they’ve been breached. Thanks to the National Conference of State Legislators, we have a hyperlinked list of the breach notification laws by state: view here. Categories:

Read More

Cyberstone Helps Companies With GDPR Cybersecurity Requirements

April 24, 2019

GDPR compliance is a bear. Let’s face it. However, like anything else in life, if you whittle it down into more manageable chunks, it doesn’t have to be nearly as daunting. Cyberstone helps companies with the cybersecurity requirements under Article 32 which include: GDPR Requirement Cyberstone Service “ensure a level of security appropriate to the…

Read More