Recently, a VPNFilter botnet which was built by Russian cyberspies infected over 500,000 routers and was finally taken down a few weeks ago by the FBI. VPNFilter malware is a complex piece of malware that infects older personal and commercial routers. They are capable of eavesdropping on traffic passing through routers especially tracking login information and other confidential credentials. Continue reading How to protect yourself from VPNFilter Botnet Malware
As healthcare evolved over the years, especially with the HIPAA/HITECH regulations of 1996, and because of the subjective nature of HIPAA, covered entities face difficult challenges in assessing compliance and security for external vendors as well as internal controls. This leads to having to reinvent the wheel every time a department or vendor handles PHI information.
Founded in 2007, HITRUST Alliance, a not-for-profit organization, whose mission is to champion the safeguard of sensitive information and manage information risk for organizations, created an ISO 27001 based framework which is prescriptive to define HIPAA/HITECH guidelines called HITRUST CSF. CSF is a certifiable framework that brings together several other compliance frameworks and standards, including HIPAA, PCI, ISO, and NIST. HITRUST CSF Domains and Controls cover 19 different domains with about 1200 separate controls based on your scope of covered information. Continue reading Lumen21 HITRUST Certified Clinic on the Microsoft Azure Cloud
Skype for Business, a unified communications (UC) platform that integrates common channels of business communication and online meetings, including instant messaging (IM), presence, voice over IP (VoIP), voicemail, file transfers, video conferencing, web conferencing and email, has finally become HIPAA compliant. HIPAA is the Health Insurance Portability and Accountability Act which helps to set the standard for the protection of patient’s data. HIPAA/HITECH applies to companies, businesses, and organizations who provide service functions using individually identifiable health information. Continue reading Skype for Business HIPAA Compliance
Facebook is one of the most popular social media websites. Based in California, it was founded in 2004 by Mark Zuckerberg along with fellow Harvard College students and roommates. Since its creation, as of 4thquarter 2017, the popular social media site has grown to have2.2 billion monthly active users. Continue reading Cambridge Analytica harvested private data from the Facebook users’ profiles — How you can protect your data on Facebook
There’s a massive culture shift occurring in enterprise IT operations and software development departments. But many businesses still operate in traditional methods, discouraging innovation and making it challenging to meet end-user expectations. To stay competitive, enterprises need to meet end users’ expectations, rapidly respond to consumer demands and organizations must ensure that their software, services, and applications integrate efficiently in the cloud. Continue reading DevOps (Dev + Ops) – The buzz that never ENDS!
For many companies one of the top priorities in today’s world is security. Many different aspects define the overall security of a company’s infrastructure, two of which are Patching and Security Training Programs. Let us see how following just these two things, will strengthen your system security. Continue reading Defend Against Security Threats by Keeping an Eye on just 2 Things
Information security is the most essential and primary thing to consider in this highly informative era. The individuals, who have a lot of confidential data, and the companies, no matter how big or small it is, should know well that backup is a necessity rather than a luxury. Therefore, backup and disaster recovery are of great importance. Continue reading Azure SQL Databases: Disaster Recovery 101
Cloud migration is the process of moving applications, data, or other business elements from an organization’s onsite computers to the cloud, or moving them from one cloud environment to another.
Cloud computing has come a long way over the years. Moving to the cloud is serious business. Only a few enterprises have managed to master the art of cloud migration. There are several common drawbacks companies make when it comes to cloud migration. Perhaps the most common and the expensive is failing to plan for compliance before beginning a cloud migration. Continue reading The Biggest Mistake Companies Make When Migrating to the Cloud
With the proliferation of BYOD (Bring Your Own Device), remote working, and 3rd party SaaS (Software as a Service) apps usage, that further promotes the “anywhere, any device” concept, more than ever, we need solutions that can help protect the company’s information. Continue reading Conditional Access in Azure Active Directory
Lumen21 as a Managed Services Provider offers a compliant cloud environment solution that can be purchased via the marketplace. Thus, enabling the customer a solution where they would not have to worry about the complexity of managing these environments using in PaaS and SaaS Applications. Regarding the custom applications, the customer will still have access into the PaaS and SaaS environments. Other than customer application updates and maintaining the solution, the customer will not need to worry about the compliance and regulatory requirements of the environment, as those will be covered by Lumen21. Continue reading Lumen21 Compliant Cloud Container