Stolen laptops mean $2M in mega fines

Healthcare IT News – Mike Miliard, Managing Editor, WASHINGTON | April 23, 2014

Serving notice that “covered entities and business associates must understand that mobile device security is their obligation,” the HHS Office for Civil Rights has settled with two organizations for a combined $1,975,220 penalty after their unencrypted computers were stolen.

[See also: Why does healthcare resist encryption? ]

That’s a big number. And that’s because it’s meant to drive home the point that unencrypted laptops and mobile devices pose significant risks to the security of patient information, said Susan McAndrew, OCR’s deputy director of health information privacy.

“Our message to these organizations is simple: Encryption is your best defense against these incidents,” she said.

[See also: OCR: 'Pay attention to details']

The biggest of the two settlements was levied against Concentra Health Services, after OCR opened an investigation following a breach report that an unencrypted laptop was stolen from one of its facilities, the Springfield Missouri Physical Therapy Center.

The probe found that Concentra had previously recognized, in multiple risk analyses, that a lack of encryption on its laptops, desktop computers, medical equipment, tablets and other devices containing electronic protected health information was a critical risk. <READ MORE>

 

MU gets low marks for improving care

Heathcare IT News – by Erin McCann, Associate Editor

Sure, the EHR Incentive Program – with its $22 billion paid out thus far to meaningful users – might have helped bring the healthcare sector out of the Dark Ages and into the 21st Century, but do these systems really improve the quality of patient care?

For the most part, a new study says, ‘no’.

Researchers at Harvard Medical School and Brigham and Women’s Hospital compared physician performance across seven Stage 1 quality measures for five chronic diseases between providers who demonstrated meaningful use of electronic health records and those who did not.

[See also: Study shows EHRs help docs boost care.]

The results were underwhelming. Following the data on nearly 860 physicians, 63 percent of which were considered meaningful users, out of the seven quality measures, meaningful use was associated with lower quality for two measures and “marginally better” quality for two measures. And for the remaining three, researchers found no association between meaningful use adopters and care quality. <READ MORE>

Building a Successful Social Media Campaign

Intuit Small Business Blog, by Carla Turchetti on April 15, 2014

As an entrepreneur, you know all about the  power of social  media: It can help you build your brand, promote your business, and  connect with customers. But  before you write your next post or tweet, consider whether your current  strategies are making efficient use of your time and resonating with your  market.

Your venture needs a social media plan as much as it needs a business plan. Any successful social media campaign begins  with a goal in mind and an awareness of which platforms are engaging your target  audience. Your approach doesn’t have to be complicated. Putting the right  messages in the right places should reach the right people.

Getting Started

“It always starts with [answering the questions]: What are you trying to  achieve? And what are your business goals and objectives?” says Kevin Bobowski,  vice president of marketing at Offerpop,  which provides digital tools for launching and analyzing social media  campaigns. “The other thing is: Who are you trying to reach? Is it existing  customers, is it prospects, or is it people you’ve never heard of?”

Answering these questions is a relatively simple undertaking for most  small-business owners, because they are so involved in every aspect of the  company, he says. Once you have determined your target audience and objectives,  you’ll find it easier to design a social media campaign that will yield the  desired results. <READ MORE>

Google Admits that It Reads your Emails

From: The Hacker News, Tuesday, April 15, 2014 by

Google has updated its privacy terms and conditions on Monday to offer more transparency regarding its email-scanning practices. One of the world’s biggest Web internet giant, Google, made it clear that the information its users submit and share with its systems is all analyzed.

Last year, Google was accused of its illegal interception of all electronic communications sent to Gmail account holders and using the gathering data to sell and place advertisements in order to serve related ads to its users. Practically, the more information you let Google collect about you, the more accurate its adverts become. <READ MORE>

Facebook Reaches Out to Small-Business Owners

Intuit Small Business Blog, by Carla Turchetti on April 14, 2014

In an effort to learn more about how its social network fuels business  success, Facebook is reaching out to expert entrepreneurs through its newly formed Small  and Medium Business Council. The council convened for the first time in  March at the company’s headquarters in Menlo Park, Calif., reports David Cohen,  editor of the AllFacebook blog.

Eighteen entrepreneurs from 12 businesses make up the council, which is  designed to be a give-and-take between the world’s largest social  media network and representatives of the millions of business owners who  actively use it to reach customers.

“It is a wonderful opportunity,” council member Kay Martinovic, owner of Kay’s Designer Consignment in Ormond Beach, Fla., tells the  Intuit Small Business Blog. “This avenue that we have now not only deals  with Facebook’s  small- to medium-size business team directly, but also with other members of the  council. It is a great group of fantastically imaginative, creative people, and  the ideas that are bounced back and forth are very exciting.” <READ MORE>

Don’t waste your money trying to upgrade your Windows XP PC

PC World Insights, by Tony , Apr 7, 2014

With the end of Windows XP support from Microsoft imminent, perhaps you’ve finally made the (very wise) decision to stop using the vulnerable operating system. I commend you. However, if you’re planning to simply install a newer operating system on your existing hardware, you should reconsider.

Sure, there’s a good chance that your existing hardware meets the minimum system requirements for either OS: a 1GHz or faster processor, 1GB of RAM (2GB for 64-bit), 16GB of hard drive space (20GB for 64-bit) and a DirectX 9 graphics device with WDDM 1.0 or higher.

But although Windows 7 or Windows 8 will technically run on a system like this,  it will do so in that way that causes you to frequently threaten your PC and spew profanity laced insults at Microsoft. For either of those operating systems to run moderately well, you need at least a dual-core CPU and 4GB of RAM. And Windows itself may only need 20GB of hard drive storage, but it’s easy to fill 500GB or more with applications, photos, videos, and other content. <READ MORE>

Heartbleed – OpenSSL Zero-day Bug leaves Millions of websites Vulnerable

From – The Hacker News, Tuesday, April 08, 2014 by

It is advised to those who are running their web server with OpenSSL 1.0.1 through 1.0, then it is significantly important that you update to OpenSSL 1.0.1g immediately or as soon as possible.

As this afternoon, an extremely critical programming flaw in the OpenSSL has been discovered that apparently exposed the cryptographic keys and private data from some of the most important sites and services on the Internet.

The bug was independently discovered by security firm Codenomicon along with a Google Security engineer. The flaw is in the popular OpenSSL cryptographic software library and its weakness allows cyber criminals to steal the information protected, under normal conditions, by the SSL (Secure Sockets Layer) or TLS (Transport Security Layer) encryption used to secure the Internet.

OpenSSL is an open-source implementation of the SSL and TLS protocols. The core library implements the basic cryptographic functions that enable SSL and TLS encryption. Mostly every websites use either SSL or TLS, even the Apache web server that powers almost half of the websites over internet utilizes OpenSSL. <READ MORE>

Free Microsoft Windows for the Internet of Things and Mobile Devices

The Hacker New Blog, Sunday, April 06, 2014 by

Tomorrow, 8th April could be a sad day for all those who are still using Windows XP, as it is an official assassination day of it, but there is also a good news that Microsoft is going to stop charging for its Windows Operating System on the devices with screens smaller than nine inches.

Yes, Free a Windows OS for the Internet of Things (IoTs)such as Mobile Devices, Smart thermostats, Smart TVs, wearable devices etc., that was announced by Microsoft at Build 2014 conference on Wednesday.

To accelerate the creation of great mobile devices running Windows and grow our number of users, we announced today that Windows will be available for $0 to hardware partners for Windows Phones and tablets smaller than 9” in size,” said Terry Myerson, executive vice president, OS Group at Microsoft and he also added that it will include a one-year subscription to Office 365. <READ MORE>

YAHOO! Now Encrypts Everything; Encrypted Yahoo Messenger Coming Soon

From – The Hacker News, Thursday, April 03, 2014 by

ON HIGH-PRIORITY YAHOO! is finally rolling out encryption implementation over their site and services in order to protect users. Yahoo is rapidly becoming one of the most aggressive supporters of encryption, as in January this year Yahoo enabled the HTTPS connections by default, that automatically encrypts the connections between users and its email service.

November last year, Yahoo revealed plans to encrypt all information that moves between its data centers and finally from 31st March Yahoo has taken another leap in user-data protection through the deployment of new encryption technologies. <READ MORE>

3 Ways To Get More Out Of Every Single Hour

Forbes Magazine, Leadership

“Lost time is never found again.” —Benjamin Franklin

Time is a key resource that we simply cannot replenish. The 24 hours of each day are all we are given—once spent, these hours are lost forever. This means that if you’re struggling to fit all of your priorities and “to-dos” into your day, it’s time to look for methods to use those hours and minutes more effectively.

Here are a few research-backed suggestions that can help you make the most of the time you have.

RELATED: Our Favorite Way to Get Our Least Favorite Work Done 

1. Value Every Single Minute

As a coach, I’ve realized that on a basic level, we tend to sell ourselves short in the time department. In many cases, we even allow others to take advantage of our time. So the most important step in time management is to take ownership of our time, making room for the activities that are meaningful and productive, and eliminating those that have less long-term value. <READ MORE>