<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / lillymark / tag / vendor</title>
<link>http://netvouz.com/lillymark/tag/vendor?feed=rss&amp;pg=2</link>
<description>lillymark&#39;s bookmarks tagged &quot;vendor&quot; on Netvouz</description>
<item><title>Fundamental Steps for Breach Prevention</title>
<link>http://www.egestalt.com/blog/2013/08/22/fundamental-steps-for-breach-prevention/</link>
<description>No organization can afford to take the risk of inadequate data protection. Protecting sensitive data should be a top priority for businesses, because a data breach can not only turn out to be very expensive, but can also result in embarrassment and additional scrutiny.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 28 Aug 2013 04:24:37 GMT</pubDate>
</item><item><title>Hackers Exploit Opportunity-Execute Well-Planned Attack</title>
<link>http://www.egestalt.com/blog/2012/11/19/hackers-exploit-opportunity-execute-well-planned-attack/</link>
<description>While the hacker attacks on big banks generated headlines and attracted mass attention, hackers – this time from across borders, made the most of this opportunity to execute a well-planned attack of a much more serious nature.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 03 Dec 2012 11:47:57 GMT</pubDate>
</item><item><title>Health Information Breach Tally Soon to Cross 20 Million</title>
<link>http://www.egestalt.com/blog/2012/10/01/health-information-breach-tally-soon-to-cross-20-million/</link>
<description>The tally of healthcare information breaches seems to be steadily increasing despite security regulations and associated legal action. The breach tally is soon to exceed 20 million once three recent breach incidents are added. With 410 incidents affecting nearly 19.2 million individuals since September 2009, the breach tally is now already at a record high. As of April 24th this year, the breach list includes four new breaches reported in 2012.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 09 Oct 2012 11:35:00 GMT</pubDate>
</item><item><title>HIPAA compliance checklist</title>
<link>http://www.amazines.com/article_detail_new.cfm/6078765?articleid=6078765</link>
<description>Protecting and securing medical patient privacy is a major concern for private, public, and government organizations in the healthcare industry, with all the patient records being digitized.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 28 Oct 2013 08:43:31 GMT</pubDate>
</item><item><title>HIPAA/HITECH compliance</title>
<link>http://www.articleblast.com/Computers_and_Internet/General/Ensuring_PCI_DSS_Compliance_%96_Part_1/</link>
<description>This is a two-part article that looks at PCI DSS and the means of achieving compliance through an effective PCI compliance management solution.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 27 Mar 2013 12:11:26 GMT</pubDate>
</item><item><title>HITRUST Provides Strong Support to the Healthcare Industry against Cyber Attacks</title>
<link>http://www.egestalt.com/blog/2012/04/30/hitrust-provides-strong-support-to-the-healthcare-industry-against-cyber-attacks/</link>
<description>Cyber threats are on the rise. There is no denying that. As the healthcare industry continues its conversion process from paper documents to electronic medical records, a tremendous increase in the data breaches is being experienced. Operational inefficiencies and security vulnerabilities have skyrocketed in the health care sector, owing to the use of new technologies. The outdated organizational policies and employees’ negligence have added further to the woes.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 02 May 2012 11:23:32 GMT</pubDate>
</item><item><title>How to Avoid Expensive HIPAA Non-Compliance Mistakes</title>
<link>http://www.egestalt.com/blog/2012/04/23/how-to-avoid-expensive-hipaa-non-compliance-mistakes/</link>
<description>HIPPA Compliance management can be convoluted and at times expensive. However, think again if you are not compliant, as its non-compliance can cost you a huge packet! Phoenix Cardiac Surgery P.C, a small Arizona physician group practice can testify to that. Because of a three-year federal investigation that began on February 2009, this small practice faces a $100,000 penalty for HIPPA violations.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 24 Apr 2012 11:20:35 GMT</pubDate>
</item><item><title>How to Survive an OCR Investigation</title>
<link>http://www.egestalt.com/blog/2011/10/15/how-to-survive-an-ocr-investigation/</link>
<description>Does the term ‘OCR Investigation’ send shivers down your spine? Well, if so, you’re definitely not alone. Every healthcare entity today faces multiple challenges with regard to information security and compliance. Incidents of data breach have become more frequent with increased use of mobile devices like laptops, smart phones, and portable storage devices like USB drives.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 12 Jul 2012 10:20:51 GMT</pubDate>
</item><item><title>How to Survive an OCR Investigation</title>
<link>http://www.egestalt.com/blog/2011/10/15/how-to-survive-an-ocr-investigation/</link>
<description>Does the term ‘OCR Investigation’ send shivers down your spine? Well, if so, you’re definitely not alone. Every healthcare entity today faces multiple challenges with regard to information security and compliance. Incidents of data breach have become more frequent with increased use of mobile devices like laptops, smart phones, and portable storage devices like USB drives.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 12 Jul 2012 10:23:30 GMT</pubDate>
</item><item><title>Integrated ALM - Automation beyond a single vendor toolset</title>
<link>http://www.youtube.com/watch?v=ovWhwtKx2SU</link>
<description>Application Lifecycle Management covers the full lifecycle of an application starting from conceptualization to building, deployment, and maintenance. Throughout this lifecycle, various tools are used to manage the activities associated with the application. As project teams get distributed globally, keeping all these tools connected and synchronized becomes a challenge.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 04 Jun 2013 09:50:01 GMT</pubDate>
</item></channel></rss>