06-05-13 | Blog Post
We’re launching an encryption webinar series for three consecutive weeks this June! Get informed from several different perspectives on the data security service, from that of a Certified HIPAA Professional (CHP) to a Software Development Manager and Systems Support Manager.
Encryption – Perspective on Privacy, Security & Compliance
Tuesday, June 11, 2013 @ 2PM ET
Starting with a perspective on privacy, security and compliance (including encrypting data for HIPAA and PCI), we’ll dive into the legalities of encryption, typical encryption methodologies and how to document and present for auditing purposes.
Join Chris Heuman, Practice Leader for RISC Management and Consulting, for an informative webinar on the value of encryption for HIPAA, PCI and many other regulatory frameworks and the successful components of a data security program that integrates encryption. Learn more and sign up online here.
Encryption at the Software Level: Linux and Windows
Tuesday, June 18, 2013 @ 2PM ET
Next, we delve into a more technical discussion about encryption at the software level for both Linux and Windows, and how encryption can be applied at various levels, from the software application code, as well as the impact on performance, backup, security and more.
Join Farooq Ahmed, Software Development Manager for Online Tech and Mark Stanislav, Security Evangelist for Duo Security as they explore how to employ encryption in order to mitigate risk of data loss or breach and what to consider in comparing different methods. Learn more and sign up online here.
Encryption at the Hardware and Storage Level
Tuesday, June 25, 2013 @ 2PM ET
Join Steve Aiello, Systems Support Manager at Online Tech for an informative webinar on encryption at the hardware and storage level. Steve will discuss how encryption can be applied at various levels from the hardware and storage perspective. Impacts on performance, backup, security, and available resources may suggest very different encryption implementations.
This webinar explores the variety of places where encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ. Learn more and sign up online here.
Encryption is just one tool considered a best practice for organizations concerned with security or those that need to meet specific compliance regulations. Find out other best practices and requirements in our white papers:
HIPAA Compliant Hosting
This white paper explores the impact of HITECH and HIPAA on data centers. It includes a description of a HIPAA compliant data center IT architecture, contractual requirements, benefits and risks of data center outsourcing, and vendor selection criteria.
PCI Compliant Hosting
This white paper provides information on PCI hosting requirements, recommendations, and the foundation of a secure PCI compliant data center.
Mobile Security
This white paper explores approaches to mobile security from risk assessment (what data are truly at risk), enterprise architecture (protect the data before the devices), policies and technologies, and concludes with an example of a mobile security architecture designed and implemented within a hospital environment.
Read more about encryption in:
Federal Health IT Budget Increases by 28 Percent: Encryption, Mobile Security & EHR Safety
The proposed federal fiscal 2014 budget calls for a 28 percent increase to support further development of health IT initiatives while taking over where HITECH funding stops (ending in fiscal year 2013). The Office for Civil Rights’ (ONC) funding will … Continue reading →
2013 State of HIPAA Encryption & Authentication for Healthcare
According to the Healthcare Information Security Today report, 2013 Outlook: Survey Offers Update on Safeguarding Patient Information, most healthcare organizations believe that encryption would greatly improve their data security. Forty-one percent plan to encrypt all mobile devices and removable media, … Continue reading →
Encrypting Data to Meet HIPAA Compliance
To address the question of whether or not to use data encryption when it comes to meeting HIPAA compliance and keeping patient health information (PHI) protected, let’s revisit the Health Insurance Portability and Accountability Act of 1996 (HIPAA): … Continue reading →