Facebook Working on Private Sharing App, Report Says

From: Mashable – Tech – by Adario Strange, September 17, 2014

Facebook is reportedly working on a new app designed to encourage private content sharing — by making the process even more personal.

Citing multiple sources, a report on Techcrunch claims that the current code name for the app is “Moments” and will give users a grid-style interface from which to share private moments with friends and family.

The reasoning behind the app, allegedly, is to assist Facebook users who want to share intimate content with close contacts, but have been put off by the site’s increasingly complicated privacy settings.

The report hedges on whether or not the app will ever actually be released, citing numerous past internal Facebook experiments that never became public-facing products.

But if true, the app would indicate that Facebook is continuing to work to win back the trust of some users who have been daunted by the site’s complicated and ever-shifting privacy settings and News Feed changes.

A Facebook spokesperson offered the company’s standard response: “we do not comment on rumors or speculation.”

Ditching Paper Signatures: Are All Electronic Alternatives Equal?

From: Law Technology Today, By Eliya Fishman August 28, 2014

More than 90% of the world’s digital data has been generated within the last two years. Everything around us is moving faster. Our on-demand, in-an-instant mindset has zero tolerance for bandwidth limitations and mobility constraints. And then, we suddenly find ourselves facing a stack of paper that should have been signed yesterday…

Paper might be dying, but the tried and true process of ‘printing to sign’ continues to linger. In fact, according to a recent ALM Media online reader survey on signature-dependent processes and the use of digital signatures, 49% of all documents are printed for the sole purpose of adding signatures. And with 47% of respondents signing documents at least four times per week, you can quickly figure out what that means in terms of wasted resources, precious time, and money. Speaking of time, the survey also revealed that processes involved with obtaining physical signatures were extended by 1.24 days on average, spelling potential disaster for time-sensitive transactions. <READ MORE>


Fake Cell Phone Towers Could be Intercepting Your Calls

From: The Hacker News: Thursday, September 04, 2014 Swati Khandelwal

A notable number of cell phone towers around the United States are rogue that, according to latest report, could spoof legitimate towers and intercept calls. The research carried out by ESD America, a defense and law enforcement technology firm based in Las Vegas, shows that a rogue cell phone towers, also known as “interceptors”, may process the call.

ESD America, the company that makes the super-secure CryptoPhone, makes one of the oldest and most expensive high-security cell phones in the market. It provides equipment and training to more than 40 countries with a goal to provide technical security assistance to government and corporate clients across Asia.<READ MORE>

3 Steps to Producing Powerful Passwords

From: Law Technology Today – Posted by: Craig Huggart  September 4, 2014

What do you do when that dreaded moment comes when you have to come up with another password? Maybe they are out there but I don’t know anyone who thinks coming up with passwords and remembering them is fun.

On the one hand, if you use a password that is easy to remember it will likely be easy to hack (and probably won’t meet the password requirements). On the other hand, if you use a complicated password it will be difficult to remember. Let’s take a look at how you can easily balance these two tensions by using a proven 3 step method.

What are the goals?

To create reasonably secure passwords. First off, it is impractical to memorize unique passwords for all the places you need them. That why I recommend using a password manager. Instead, the goal is to create secure passwords for your “master password” and for those places you can’t use a password manager. I am not a security expert but I trust Steve Gibson. His general recommendations are: <READ MORE>

One of the best password managers for your PC, devices, and the cloud

FromPC World – Security – by Lincoln Spector, Posted August 25, 2014

Everyone who uses the Internet absolutely must have a password manager. Without one, you’ll forget some of your passwords. Or you’ll use the same password for different sites, which allows a thief who’s hacked one password to know them all. Or you’ll use simple passwords that are easy to remember but also easy to hack.

A password manager program stores your passwords and other login information in an encrypted database. If you need to log into a website or a secure application, you open the password manager, type the password to your password manager (which is the only password you’ll ever have to memorize), and get the information that you need.

But which password manager should you use? <READ MORE>

Top 10 New Technologies That Will Change Small Business

From: Intuit QuickBooks, by Nicklas Prieto on June 26, 2014

The digital age has brought with it innumerable innovations that continue to change the way the world does business. Buzzwords abound on the internet, bringing to light terms that often fade into obscurity as quickly as they rise to prominence. But some innovations occasionally stick, and the 10 new technologies discussed in this list are definitely here to stay, at least until new tech comes out that makes them obsolete.

Until then, follow along to learn how these new innovations can help change the way you conduct business. <SEE TOP 10>

HIE goes live with eHealth Exchange

From Healthcare IT News, Erin McCann, Associate Editor, July 28, 2014

A new state health information exchange has officially signed on with the eHealth Exchange, bringing an additional 16 million patient records into the national HIE pool.

Georgia Health Information Network announced this past week that it was joining the already 70 participants live with the eHealth Exchange, formerly the Nationwide Health Information Network, a non-profit public-private initiative created by the Office of the National Coordinator for Health IT to spur healthcare quality and efficiency by establishing a platform for exchanging health data across borders. The participants, which include more than 1,000 hospitals and 6,000 medical groups and 60 million patients, exchange millions of transactions each year.

[See also: Nation's eHealth Exchange stands up.]

Officials say the new partnership will allow the some 16 million patient records in the Georgia network to be readily exchanged across the continuum of care, ultimately leading to improved care, a decline in readmissions, reductions in duplicate testing, prescription compliance and continuity of care.

“With GaHIN’s national connectivity comes Georgia’s ability to share medical information immediately and securely with neighboring states, and eventually more states across the U.S.,” said Denise Hines, executive director of GaHIN, in a July 24 press statement. “This expanded connectivity allows for the delivery of the right health information to the right place at the right time – no matter where the patient is receiving care – across a robust national network.”

Currently, GaHIN, established in 2009, has connected members consisting of regional HIEs, hospital systems, physician groups and individual practitioners that currently reach counties across the state.

[See also: HIE network sees record participation.]

Officials note that GaHIN members have access to all existing and future services, including lab routing; admission, discharge and transfer alerts; referral requests; and secure messaging.

ICD-10 Resources Spotlight: Road to 10

CMS News Updates| July 25, 2014

Looking for help planning and executing your ICD-10 transition?

The Centers for Medicare & Medicaid Services (CMS) has developed the Road to 10, a free online resource built with the help of physicians in small practices. Available on the Provider Resources page at cms.gov/ICD10, this tool is intended to help small medical practices jumpstart their ICD-10 transition.

The Road to 10 can help you:

  • Understand the basics of ICD-10
  • Build an ICD-10 action plan to map out your transition
  • Answer frequently asked questions
  • Learn how ICD-10 affects your practice with tailored clinical scenarios and documentation tips for Family Practice and Internal Medicine, Obstetrics and Gynecology, Orthopedics, Cardiology, and Pediatrics

The Road to 10 is regularly updated, so check back frequently for new information.

Keep Up to Date on ICD-10Visit the CMS ICD-10 website for the latest news and resources to help you prepare. Sign up for CMS ICD-10 Industry Email Updates and follow us on Twitter.

Microsoft Boosts Encryption for Outlook Webmail and OneDrive

From: The Hackers News – Wednesday, July 02, 2014 by

After the wide chain of scandals over US global snooping that seriously damaged the trust on the top U.S. Tech companies, Google and Yahoo! came forward and took initiative to provide more secure, encrypted and NSA-proofed service in an effort to gain their reputation again among its users.

Now, Microsoft has also announced several improvements to the encryption used in its online cloud services in order to protect them from cyber criminals, bad actors and prying eyes. The company effort detailed in a blog entry by Matt Thomlinson, Microsoft’s Vice President of Trustworthy Computing Security.
Last December, Microsoft promised to protect its users data from government snooping by expanding encryption across its services, reinforcing legal protections for its customers’ data and enhancing the transparency of its software code, making it easier for the customers to reassure themselves that its products contain no backdoors. <READ MORE>