Blog

23
Apr

OCR will Levy HIPAA Fines on Nonprofits The Office for Civil Rights (OCR) at the Department of Health and Human Services is responsible for HIPAA enforcement. On April 12, they issued the following announcement: On January 27, 2012, MCPN filed a breach report with OCR indicating that a hacker accessed employees’ email accounts and obtained 3,200 individuals’ […]

18
Apr

The need for tech talent continues to grow. In its 2017 State of Tech Recruiting report, Built In indicated that 53 percent of companies surveyed have salary increases planned for 2017 in hopes of attracting the most qualified personnel. Other sources report similar growth. The Computing Technology Industry Association’s 2016 edition of Cyberstates revealed that the technology industry […]

4
Apr

For all the problems technology solves, there are still times when the software and equipment that power our lives and livelihoods feel more like burdens than enablers. Your tech problems are sometimes mundane incidents — an employee’s Excel spreadsheet is frozen, or there’s a spinning beach ball of death where your cursor used to be. […]

18
Mar

What The AWS Outage Teaches Us On February 28, a part of Amazon’s cloud service went down for several hours, causing widespread failures of web sites and web apps hosted on the platform.  Amazon’s AWS S3 service had an interruption at one of their data centers on the East Coast of the US and resulted […]

16
Mar

(This article was written by Adam Levy, owner of Magnet Solutions Group, and originally appeared in Medical Economics.) While the widespread adoption of electronic health records (EHRs) among healthcare providers is here, the dramatic boost in efficiency across the healthcare system that was supposed to accompany this shift has yet to be fully realized. It […]

24
Feb

Hashing Algorithm Already On the Way Out Google announced this week that a team of its researchers had definitively broken SHA-1, a hashing algorithm that has been widely used across the internet. A hashing algorithm, or cryptographic hash function, is a mathematical construct used in cybersecurity to validate the authenticity of files.  Using the function, any […]