<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / lillymark / tag / vulnerability</title>
<link>http://netvouz.com/lillymark/tag/vulnerability?feed=rss&amp;pg=2</link>
<description>lillymark&#39;s bookmarks tagged &quot;vulnerability&quot; on Netvouz</description>
<item><title>eGestalt Announces Next Generation Security Posture Management with Aegify</title>
<link>https://www.egestalt.com/egestalt-announces-next-generation-security-posture-management-with-aegify.html</link>
<description>eGestalt Technologies (www.eGestalt.com), a provider of IT security monitoring and compliance management for SMBs and enterprises, today announced Aegify, the world’s first completely integrated and unified IT-GRC and cloud-based Security Posture Management (SPM) product using a completely software-based solution.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 20 Nov 2012 07:56:30 GMT</pubDate>
</item><item><title>eGestalt Launches Next Generation Security Posture Management Product</title>
<link>http://www.egestalt.com/egestalt-launches-next-generation-security-posture-management-product.html</link>
<description>Security monitoring and compliance management provider eGestalt Technologies has released an integrated and unified IT-GRC and cloud-based security posture management (SPM) software product, Aegify.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 10 Dec 2012 12:03:09 GMT</pubDate>
</item><item><title>Estimate Potential Breach Costs- Justify Your Security Investments</title>
<link>http://www.egestalt.com/blog/2012/03/07/estimate-potential-breach-costs-justify-your-security-investments/</link>
<description>Now you can measure the potential cost of a data breach in your organization and take appropriate steps to invest in a befitting solution that can prevent data breaches from occurring. The American National Standards Institute (ANSI)in collaboration with Santa Fe Group/Shared Assessments Program Healthcare Working Group, and the Internet Security Alliance (ISA), issued a report titled, “The financial Impact of Breached Protected Health Information – A Business Case for Enhanced PHI Security”, offering a five-step method, to help healthcare organizations determine what a data breach may cost them.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 09 May 2012 04:39:20 GMT</pubDate>
</item><item><title>Four New Provisions in the Final HIPAA Rule to Impact Healthcare Entities</title>
<link>http://www.egestalt.com/blog/2013/02/06/four-new-provisions-in-the-final-hipaa-rule-to-impact-healthcare-entities/</link>
<description>With great power also comes great responsibility. And this is especially true for healthcare entities that employ the power of information to provide better services. Patient Health Information, like any other information is a valuable asset for healthcare organizations. However, organizations that handle and process health information are also expected to protect it. This is why HIPAA and HITECH regulations are of great significance to the healthcare industry.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 12 Feb 2013 07:31:40 GMT</pubDate>
</item><item><title>Hackers Hit New Target: Small Businesses Beware!</title>
<link>http://www.egestalt.com/blog/2011/07/27/hackers-hit-new-target-small-businesses-beware/</link>
<description>Cyber criminals have now shifted course – and with a strategy that puts small businesses in jeopardy! Joe Angelastri owner of City Newstand Inc. had never imagined that his small business could be a target for hackers. Last year Angelastri suffered a loss of $22,000 because of theft of customer credit card information from his two magazine shops in the Chicago area where hackers had planted a malware program in his cash registers.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 07 Aug 2012 06:28:53 GMT</pubDate>
</item><item><title>HITRUST Provides Strong Support to the Healthcare Industry against Cyber Attacks</title>
<link>http://www.egestalt.com/blog/2012/04/30/hitrust-provides-strong-support-to-the-healthcare-industry-against-cyber-attacks/</link>
<description>Cyber threats are on the rise. There is no denying that. As the healthcare industry continues its conversion process from paper documents to electronic medical records, a tremendous increase in the data breaches is being experienced. Operational inefficiencies and security vulnerabilities have skyrocketed in the health care sector, owing to the use of new technologies. The outdated organizational policies and employees’ negligence have added further to the woes.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 02 May 2012 11:23:32 GMT</pubDate>
</item><item><title>How to Avoid Expensive HIPAA Non-Compliance Mistakes</title>
<link>http://www.egestalt.com/blog/2012/04/23/how-to-avoid-expensive-hipaa-non-compliance-mistakes/</link>
<description>HIPPA Compliance management can be convoluted and at times expensive. However, think again if you are not compliant, as its non-compliance can cost you a huge packet! Phoenix Cardiac Surgery P.C, a small Arizona physician group practice can testify to that. Because of a three-year federal investigation that began on February 2009, this small practice faces a $100,000 penalty for HIPPA violations.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 24 Apr 2012 11:20:35 GMT</pubDate>
</item><item><title>How to Ensure PCI DSS Compliance - Part 2</title>
<link>http://orson10.posterous.com/how-to-ensure-pci-dss-compliance-part-2</link>
<description>PCI compliance is becoming an everyday concern for those businesses apprehensive about vulnerabilities in the consumer payment card transactions processes.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 28 Mar 2013 04:02:35 GMT</pubDate>
</item><item><title>How to Survive an OCR Investigation</title>
<link>http://www.egestalt.com/blog/2011/10/15/how-to-survive-an-ocr-investigation/</link>
<description>Does the term ‘OCR Investigation’ send shivers down your spine? Well, if so, you’re definitely not alone. Every healthcare entity today faces multiple challenges with regard to information security and compliance. Incidents of data breach have become more frequent with increased use of mobile devices like laptops, smart phones, and portable storage devices like USB drives.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 12 Jul 2012 10:20:51 GMT</pubDate>
</item><item><title>How to Survive an OCR Investigation</title>
<link>http://www.egestalt.com/blog/2011/10/15/how-to-survive-an-ocr-investigation/</link>
<description>Does the term ‘OCR Investigation’ send shivers down your spine? Well, if so, you’re definitely not alone. Every healthcare entity today faces multiple challenges with regard to information security and compliance. Incidents of data breach have become more frequent with increased use of mobile devices like laptops, smart phones, and portable storage devices like USB drives.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 12 Jul 2012 10:23:30 GMT</pubDate>
</item></channel></rss>