One of the best password managers for your PC, devices, and the cloud

FromPC World – Security – by Lincoln Spector, Posted August 25, 2014

Everyone who uses the Internet absolutely must have a password manager. Without one, you’ll forget some of your passwords. Or you’ll use the same password for different sites, which allows a thief who’s hacked one password to know them all. Or you’ll use simple passwords that are easy to remember but also easy to hack.

A password manager program stores your passwords and other login information in an encrypted database. If you need to log into a website or a secure application, you open the password manager, type the password to your password manager (which is the only password you’ll ever have to memorize), and get the information that you need.

But which password manager should you use? <READ MORE>

Top 10 New Technologies That Will Change Small Business

From: Intuit QuickBooks, by Nicklas Prieto on June 26, 2014

The digital age has brought with it innumerable innovations that continue to change the way the world does business. Buzzwords abound on the internet, bringing to light terms that often fade into obscurity as quickly as they rise to prominence. But some innovations occasionally stick, and the 10 new technologies discussed in this list are definitely here to stay, at least until new tech comes out that makes them obsolete.

Until then, follow along to learn how these new innovations can help change the way you conduct business. <SEE TOP 10>

HIE goes live with eHealth Exchange

From Healthcare IT News, Erin McCann, Associate Editor, July 28, 2014

A new state health information exchange has officially signed on with the eHealth Exchange, bringing an additional 16 million patient records into the national HIE pool.

Georgia Health Information Network announced this past week that it was joining the already 70 participants live with the eHealth Exchange, formerly the Nationwide Health Information Network, a non-profit public-private initiative created by the Office of the National Coordinator for Health IT to spur healthcare quality and efficiency by establishing a platform for exchanging health data across borders. The participants, which include more than 1,000 hospitals and 6,000 medical groups and 60 million patients, exchange millions of transactions each year.

[See also: Nation's eHealth Exchange stands up.]

Officials say the new partnership will allow the some 16 million patient records in the Georgia network to be readily exchanged across the continuum of care, ultimately leading to improved care, a decline in readmissions, reductions in duplicate testing, prescription compliance and continuity of care.

“With GaHIN’s national connectivity comes Georgia’s ability to share medical information immediately and securely with neighboring states, and eventually more states across the U.S.,” said Denise Hines, executive director of GaHIN, in a July 24 press statement. “This expanded connectivity allows for the delivery of the right health information to the right place at the right time – no matter where the patient is receiving care – across a robust national network.”

Currently, GaHIN, established in 2009, has connected members consisting of regional HIEs, hospital systems, physician groups and individual practitioners that currently reach counties across the state.

[See also: HIE network sees record participation.]

Officials note that GaHIN members have access to all existing and future services, including lab routing; admission, discharge and transfer alerts; referral requests; and secure messaging.

ICD-10 Resources Spotlight: Road to 10

CMS News Updates| July 25, 2014

Looking for help planning and executing your ICD-10 transition?

The Centers for Medicare & Medicaid Services (CMS) has developed the Road to 10, a free online resource built with the help of physicians in small practices. Available on the Provider Resources page at, this tool is intended to help small medical practices jumpstart their ICD-10 transition.

The Road to 10 can help you:

  • Understand the basics of ICD-10
  • Build an ICD-10 action plan to map out your transition
  • Answer frequently asked questions
  • Learn how ICD-10 affects your practice with tailored clinical scenarios and documentation tips for Family Practice and Internal Medicine, Obstetrics and Gynecology, Orthopedics, Cardiology, and Pediatrics

The Road to 10 is regularly updated, so check back frequently for new information.

Keep Up to Date on ICD-10Visit the CMS ICD-10 website for the latest news and resources to help you prepare. Sign up for CMS ICD-10 Industry Email Updates and follow us on Twitter.

Microsoft Boosts Encryption for Outlook Webmail and OneDrive

From: The Hackers News – Wednesday, July 02, 2014 by

After the wide chain of scandals over US global snooping that seriously damaged the trust on the top U.S. Tech companies, Google and Yahoo! came forward and took initiative to provide more secure, encrypted and NSA-proofed service in an effort to gain their reputation again among its users.

Now, Microsoft has also announced several improvements to the encryption used in its online cloud services in order to protect them from cyber criminals, bad actors and prying eyes. The company effort detailed in a blog entry by Matt Thomlinson, Microsoft’s Vice President of Trustworthy Computing Security.
Last December, Microsoft promised to protect its users data from government snooping by expanding encryption across its services, reinforcing legal protections for its customers’ data and enhancing the transparency of its software code, making it easier for the customers to reassure themselves that its products contain no backdoors. <READ MORE>

Encryption of Mobile Devices: A Security No-Brainer

From: Law Technology Today, June 18, 2014, written by

As attorneys continue to increasingly embrace mobile technology like laptops, smartphones, tablets, external hard drives, and USB (thumb) drives, it is critical for them to understand and address the risks. The attributes that make theses devices so useful – they are portable and compact, with high storage capacity – also make them risky. They can easily be lost or stolen, compromising the data stored on them.

Fortunately, there are inexpensive and easy to use encryption solutions to protect confidentiality in the event of loss or theft of mobile devices. While many attorneys will need help in setting up encryption, it is generally easy to use after it has been set up.

Verizon’s 2014 Data Breach Investigations Report, a leading analysis of security incidents and their causes, explains it this way:

The primary root cause of incidents in this pattern is carelessness of one degree or another. Accidents happen. People lose stuff. People steal stuff. And that’s never going to change. But there are a few things you can do to mitigate that risk.

Encrypt devices
Considering the high frequency of lost assets, encryption is as close to a no-brainer solution as it gets for this incident pattern. Sure, the asset is still missing, but at least it will save a lot of worry, embarrassment, and potential lawsuits by simply being able to say the information within it was protected. Also, periodically checking to ensure encryption is still active is right up there too. This will come in handy when the auditor or regulator asks that dreaded question: “How do you know for sure it was encrypted?” <READ MORE>

Maliciously crafted files can disable Microsoft’s security products

From PC World – Security – June 18, 2014, by Lucian Constantin

This information can be very useful especially to those of you working from home.  Providing this sort of content can help to minimize your risk.

A vulnerability allows attackers to disable Microsoft’s antimalware products by sending specifically crafted files to users via websites, email, or instant messaging applications.

The vulnerability is located in the Microsoft Malware Protection Engine, which sits at the core of many Microsoft security products for desktops and servers including Microsoft Forefront Client Security, Microsoft System Center 2012 Endpoint Protection, the Microsoft Malicious Software Removal Tool, Microsoft Security Essentials, Windows Intune Endpoint Protection and Windows Defender, which comes pre-installed in Windows Vista and later.

Microsoft fixed the vulnerability in Microsoft Malware Protection Engine 1.1.10701.0 released Tuesday. For home users, the new version should typically download and install automatically within 48 hours, but administrators in enterprise environments should make sure that their update management software is configured to approve the engine updates.

If left unpatched, the vulnerability can be exploited to force the Microsoft Malware Protection Engine into a scan timeout, essentially leading to a denial-of-service vulnerability. When this happens, the antimalware product will stop monitoring the system for threats until the rogue file is removed and the malware protection service is restarted. <READ MORE>

From HIE to HR, cloud finding favor

From: Healthcare IT News, June 17, 2014, Mike Miliard, Managing Editor

Business associate agreements, security concerns prove problematic for providers

Eighty percent of respondents to the inaugural 2014 HIMSS Analytics Cloud Survey say they currently use cloud-based IT services. Still qualms about performance and privacy persist.

Lower maintenance costs, faster deployment and the ability to step in when staffing resources are scarce are the cloud’s top three selling points, according to the poll, which finds that of the organizations currently making use of the cloud, nearly all of them plan to expand their use.

[See also: New HIPAA rule could change BAA talks]

Half of the cloud adopters are hosting clinical applications in the cloud, primarily using software-as-a-service tools, according to HIMSS Analytics. Typical cloud services include health information exchange, the hosting human resources applications and backup and disaster recovery.

“Cloud services have been long praised as a tool to reduce operating expenses for healthcare organizations,” said Lorren Pettit, vice president of market research for HIMSS Analytics, in a press statement. “The data presented in our inaugural survey demonstrates the healthcare industry’s eagerness to leverage this resource.”       <READ MORE>

Oops! Tim Cook tweets photo of Mac production line running Windows

From PC World: Jun 6, 2014, Mark Hachman@markhachman

The definition of ironic – happening in the opposite way to what is expected, and typically causing wry amusement because of this.

Well, there’s apparently one good thing Microsoft’s Windows is good at: running the software necessary to manufacture Apple’s Mac computers.

And the messenger of this information? Apple chief executive Tim Cook himself. On Thursday, Cook tweeted a photo of himself touring Apple’s Austin, Texas production line where the Apple Mac Pro is manufactured: <READ MORE>

View image on Twitter