Wednesday, 20 August 2014

Healthcare organizations still too lax on security

Data breach at Community Health is symptom of broader problem, security experts say

The data breach at Community Health Systems that exposed the names, Social Security numbers and other personal details on more than 4.5 million people is a symptom of the chronic lack of attention to patient data security and privacy within the healthcare industry.

For more than 10 years, the Health Information Portability and Accountability Act (HIPAA) has required all entities handling healthcare data to implement controls for protecting the data, yet many organizations pay little more than glancing attention to the rules because of the relatively lax enforcement of the standards.

The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services has begun cracking down recently on hospitals and other healthcare entities that have suffered security and privacy breaches. The Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 introduced some significant penalties for noncompliance with data security requirements.

Yet, many health organizations don't see data security as a major concern until a breach. So far this year, healthcare entities have reported to the HHS at least 150 incidents involving compromises of personal data.

"The industry has a long culture of not recognizing the incredible value of healthcare information," to those who want to misuse it, said Deborah Peel, a physician and founder of the advocacy group Patient Privacy Rights.

Apart from a lack of real enforcement of any of the privacy and security provisions in HIPAA, the industry has also suffered from the lack of an auditing requirement for security, Peel said.

HIPAA doesn't require even large healthcare organizations to submit to a third-party audit of their data security controls. "Only if you have a breach or someone reports you are you likely to come to the attention of HHS," Peel said.

Companies in other industries, such has financial services, have to go to great lengths to externally validate their systems and provide audit reports on request, she said. "There is no such requirement in healthcare," even though the information handled by the industry is highly sensitive and far more valuable in the underground market than financial data.

"There is a lot of catching up to do. A lot of public trust is going to be lost," before real change happens in the industry, Peel said.

Things will probably have to get worse before it starts getting better, said Phil Lieberman, president of Lieberman Software, a security vendors.

"It will take a Target type of episode where a healthcare provider and their C-suite face demise due to the damage they have caused to their entire population of patients to get some providers to wake up," and invest in real security, Lieberman said.

The unfortunate reality is that most healthcare providers have little concern for having IT security, he noted. "There is no incentive for them to invest, nor is there any material consequence for their failure to protect their infrastructure. HIPAA has had little to no effect in protecting patient data."

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Monday, 4 August 2014

Mozilla warns of leaky developer network database

Mozilla’s website for developers leaked email addresses and encrypted passwords of registered users for about a month due to a database error, the

Email addresses for 76,000 Mozilla Development Network (MDN) users were exposed, along with around 4,000 encrypted passwords, wrote Stormy Peters, director of development relations, and Joe Stevensen, operations security manager in a blog post. Mozilla is notifying those affected.

No malicious activity on the affected server was detected, but that does not mean the data wasn’t accessed, they wrote.

A Web developer discovered around 10 days ago that a data sanitization process on the database running the MDN wasn’t working. The leak started around June 23 and continued for a month.

“As soon as we learned of it, the database dump file was removed from the server immediately, and the process that generates the dump was disabled to prevent further disclosure,” they wrote.

The exposed passwords were encrypted and “salted,” a security measure that makes it difficult to revert them to their original form. Even if the passwords were decrypted, “they by themselves cannot be used to authenticate with the MDN website today,” according to the post.

Since some people may used the same MDN password on other websites, it’s recommended the password be changed.

Mozilla said it was “deeply sorry” for the error.

“In addition to notifying users and recommending short term fixes, we’re also taking a look at the processes and principles that are in place that may be made better to reduce the likelihood of something like this happening again,” according to the post.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Climbing Aboard the 3rd Platform

Recent news from IBM and Microsoft highlight the upheavals underway as the technology industry rapidly transitions to new realities.


IBM announced that profits were up even as revenue was down as it continues to shift away from hardware business lines and tries "to convert the future of technology into an opportunity rather than a threat." Microsoft announced its largest layoff ever as it continues to "become more agile and move faster" toward cloud and mobile hardware!

These upheavals are due to the forces propelling mobile, social, cloud and big data into what IDC labels the 3rd Platform, “the emerging platform for growth and innovation.”

"The 3rd Platform will deliver the next generation of competitive advantage apps and services that will significantly disrupt market leaders in virtually every industry," IDC seer Frank Gens said, in laying out the firm’s predictions for 2014, late last year.

When long-time nemeses Apple and IBM climb into bed you know the ground is shaking!

With access to cloud infrastructure and other resources, new companies can be created almost overnight – the advantages of size that large, established companies used to rely on have greatly diminished. Everybody needs to be more agile, more flexible and willing to sacrifice proprietary advantages when customers demand adherence to open standards.

With so much change, no organization can afford to stand pat on the networking architecture of the past. Enterprises are driven to simultaneously improve business processes while reducing IT costs.

In order to move beyond the physical limitations of yesterday’s architecture so they can manage the complexity of the ever more connected world, many enterprises are modernizing data centers. Seeking to transform infrastructure into assets, they are turning to virtualization and cloud computing to drive up availability and transition IT to a services orientation.

They won’t get there with traditional Ethernet networks that rely on a rigid hierarchical approach that creates inefficient traffic patterns and purposely curtails the scalability. A newer category of flatter Ethernet networks called Ethernet fabrics combine the familiarity of Ethernet networks with the data center-hardened reliability and performance characteristics of fabric technologies such as Fibre Channel to provide organizations with elastic, highly automated, mission-critical networks to meet rapidly changing requirements.

Ethernet fabrics are specifically designed for the virtualized data center environments needed to transition to the 3rd Platform. Rather than focusing on management of discrete physical devices and physical ports, they logically eliminate the management of multiple switching layers and apply policies and manage traffic across many physical switches as if they were one.

Trying to forestall movement to the 3rd Platform is, at best, a defensive strategy that attempts to maintain a static position in an incredibly dynamic environment. It doesn’t make sense to become more stodgy while competitors are increasingly agile. As the situations at IBM and Microsoft attest, market advantages that once seemed insurmountable can quickly erode in the face of rapid transformation.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com