<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Compliance Archives - Aditi Group Managed IT &amp; Consulting</title>
	<atom:link href="https://aditigroup.com/category/compliance/feed/" rel="self" type="application/rss+xml" />
	<link>https://aditigroup.com/category/compliance/</link>
	<description>IT Privacy • Protection • Productivity</description>
	<lastBuildDate>Thu, 13 Feb 2025 22:50:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://aditigroup.com/data-privacy/wp-content/uploads/cropped-aditi-group-icon-512-t-32x32.png</url>
	<title>Compliance Archives - Aditi Group Managed IT &amp; Consulting</title>
	<link>https://aditigroup.com/category/compliance/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Podcast: 2025 HIPAA Proposed Rule Changes You Need to Know About</title>
		<link>https://aditigroup.com/2025-hipaa-proposed-rule-changes-you-need-to-know-about/</link>
		
		<dc:creator><![CDATA[Cyber Guru]]></dc:creator>
		<pubDate>Thu, 13 Feb 2025 22:42:06 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Aditi Group]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[compliance audits]]></category>
		<category><![CDATA[Dorothy Cociu]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[HIPAA requirements]]></category>
		<category><![CDATA[HIPAA Security Rule]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[incident response]]></category>
		<category><![CDATA[Marilyn Monahan]]></category>
		<category><![CDATA[monitor]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[robust risk management]]></category>
		<category><![CDATA[Ted Flittner]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1568</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/2025-hipaa-proposed-rule-changes-you-need-to-know-about/">Podcast: 2025 HIPAA Proposed Rule Changes You Need to Know About</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Benefits Executive Roundtable Podcast</h2>
<p><strong>Watch &amp; Listen as Aditi Group&#8217;s Ted Flittner covers ground on the recently proposed HIPAA Security Rule changes and how they can affect you.</strong></p>
<p>Dorothy Cociu discusses the recently released HIPAA Security Proposed Rules with Marilyn Monahan of Monahan Law Office and Ted Flittner, Principal of Aditi Group, an IT/HIPAA Security/Cybersecurity firm. In Part 1 of this series, we discuss the proposed requirements for written policies and procedures, establishing technical and non-technical evaluations, and a robust risk management plan. Many requirements are annual, with at least one every six months. We discuss the requirement for encryption, patch management, monitoring, incident response, testing, an annual compliance audit, and more. What’s in the new proposed rules specifically? Join us for this informative podcast.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>LISTEN NOW</h3></div>
			</div><div class="et_pb_module et_pb_code et_pb_code_0">
				
				
				
				
				<div class="et_pb_code_inner"><iframe src="https://podcasters.spotify.com/pod/show/benefitsexecroundtable/embed/episodes/S6E11---HIPAA-Security-Proposed-Rules-Part-1-e2ud0ro" height="102px" width="400px" frameborder="0" scrolling="no">
</div>
			</div>
			</div><div class="et_pb_column et_pb_column_2_5 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>WATCH VIDEO PODCAST</h3></div>
			</div><div class="et_pb_module et_pb_video et_pb_video_0">
				
				
				
				
				<div class="et_pb_video_box"><iframe title="S6E11 - HIPAA Security Proposed Rules Part 1" width="1080" height="608" src="https://www.youtube.com/embed/sR2ROzusq2U?feature=oembed&amp;rel=0&amp;controls=1"  allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div>
				
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/2025-hipaa-proposed-rule-changes-you-need-to-know-about/">Podcast: 2025 HIPAA Proposed Rule Changes You Need to Know About</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>HIPAA Training on New Regulations &#038; Updates in 2025</title>
		<link>https://aditigroup.com/hipaa-training-on-new-regulations-updates-in-2025/</link>
		
		<dc:creator><![CDATA[Security Expert]]></dc:creator>
		<pubDate>Fri, 24 Jan 2025 23:03:31 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[changes]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[in-person. HIPAA]]></category>
		<category><![CDATA[privacy office]]></category>
		<category><![CDATA[privacy work group]]></category>
		<category><![CDATA[regulations]]></category>
		<category><![CDATA[reproductive rights]]></category>
		<category><![CDATA[required training]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1543</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/hipaa-training-on-new-regulations-updates-in-2025/">HIPAA Training on New Regulations &amp; Updates in 2025</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_2_3 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Get Ready for Changes!</h2>
<p>HIPAA new proposed regulations bring many new requirements for ALL Covered Entities big and small as well as for Business Associates.  Learn about the changes in detail and about updates to HIPAA Reproductive Rights requirements.</p>
<p>&nbsp;</p>
<h3 style="text-align: center;"></h3>
<h3 style="text-align: center;">Two venues and dates to attend IN-PERSON</h3>
<h3 style="text-align: center;">March 18, 2025 9am &#8211; 4pm<br />Anaheim Hills, Orange County</h3>
<h3 style="text-align: center;">April 23, 2025 9am &#8211; 4pm<br />Santa Fe Springs, Los Angeles County</h3></div>
			</div><div class="et_pb_button_module_wrapper et_pb_button_0_wrapper et_pb_button_alignment_center et_pb_module  dbdb-icon-on-right dbdb-icon-on-hover">
				<a class="et_pb_button et_pb_button_0 et_pb_bg_layout_light" href="https://advancedbenefitconsulting.com/all-new-hipaa-privacy-security-training-march-april-2025" target="_blank">Learn More</a>
			</div>
			</div><div class="et_pb_column et_pb_column_1_3 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_0">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="222" height="224" src="https://aditigroup.com/data-privacy/wp-content/uploads/health-and-human-services-hipaa.gif" alt="Health &amp; Human Services" title="health-and-human-services-hipaa" class="wp-image-1545" /></span>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/hipaa-training-on-new-regulations-updates-in-2025/">HIPAA Training on New Regulations &amp; Updates in 2025</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is Blockchain a Security Savior for Healthcare and Us All?</title>
		<link>https://aditigroup.com/is-blockchain-a-security-savior-for-healthcare-and-us-all/</link>
		
		<dc:creator><![CDATA[Cyber Guru]]></dc:creator>
		<pubDate>Thu, 03 Nov 2022 19:49:44 +0000</pubDate>
				<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[IT Solutions]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[hacks]]></category>
		<category><![CDATA[hardware wallets]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[hipaa compliance]]></category>
		<category><![CDATA[performance problems]]></category>
		<category><![CDATA[supply chain]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=960</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/is-blockchain-a-security-savior-for-healthcare-and-us-all/">Is Blockchain a Security Savior for Healthcare and Us All?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>The Goals of Blockchain: Trust and Security</h2>
<h2>What is Blockchain? Blockchain explained for non-coders</h2>
<p>Blockchain is a way of recording that sequentially links every revision of a a record, in a distributed / shared log (or ledger for finance folks).  Every transaction is recorded in an every growing record chain.</p>
<h4>Featues of Blockchain Records</h4>
<ul>
<li>decentralized digital record ledger</li>
<li>data records (blocks) are tied together in time sequence</li>
<li>any change to a record adds a new block</li>
<li>nothing can be deleted or changed without a record as evidence</li>
<li>&#8220;tamper proof&#8221;</li>
<li>can be used for any kind of data</li>
<li>distributed network &#8211; doesn&#8217;t reside on just one computer or desk</li>
</ul>
<h2></h2>
<h2>Security and Trust</h2>
<p><strong>Blockchain brings the promise of trusted data,</strong> and impossible&#8230;or very low probability of fakes. It can allow a person to own their own data and share it with the world as they choose. Panacea.</p>
<p>&nbsp;</p>
<h2>Code Is Opportunity</h2>
<p>But this is code and electronics. There is always some relative weakness.  Code is the realm of hacks.</p>
<p>Crypto hacks have shown that environments where blockchain are used are not unlike other things in the cyber world.  Regardless of how trusted or secure a blockchain inidivudal record is, the the application or system it&#8217;s used in is vulnerable to the same old cybersecurity problems that befall everyone else.</p>
<p>Two main ways: stolen keys (the passwords), and exploiting bugs in code. Here are some expensive examples:</p>
<blockquote class="wp-embedded-content" data-secret="mHUgZF8POq"><p><a href="https://blockworks.co/the-nine-largest-crypto-hacks-in-2022/">The Nine Largest Crypto Hacks in 2022</a></p></blockquote>
<p><iframe loading="lazy" class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;The Nine Largest Crypto Hacks in 2022&#8221; &#8212; Blockworks" src="https://blockworks.co/the-nine-largest-crypto-hacks-in-2022/embed/#?secret=pTgeASvjIu#?secret=mHUgZF8POq" data-secret="mHUgZF8POq" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<blockquote class="wp-embedded-content" data-secret="39q8TequQs"><p><a href="https://techmonitor.ai/technology/cybersecurity/biggest-cryptocurrency-hacks-of-all-time">The biggest cryptocurrency hacks of all time</a></p></blockquote>
<p><iframe loading="lazy" class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;The biggest cryptocurrency hacks of all time&#8221; &#8212; Tech Monitor" src="https://techmonitor.ai/technology/cybersecurity/biggest-cryptocurrency-hacks-of-all-time/embed#?secret=uNaKY72lLM#?secret=39q8TequQs" data-secret="39q8TequQs" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h2>Where is Blockchain Used?  Is it Here Yet? </h2>
<p>Blockchain is being introduced in the background with the <strong>big insurers, banks, pharma, governments</strong>, etc. For most of us, we won&#8217;t see it or it won&#8217;t affect us for a while (some years).  Blockchain is really only encoutered by most people who invest in or read about crypto currencies.  What blockchain offers crypto is the distributed, trusted accounting that is needed when there is no central bank.  It&#8217;s the perfect and obvious applicaiton for this new way of tracking transactions. </p>
<h3>Healthcare Blockchain &amp; How It&#8217;s Used</h3>
<p>Blockchain methodology and application are still in the infancy stages for the healthcare industry as a whole. There is an ever increasing number of companies applying blockchain in different ways.</p>
<p><strong>Some create trusted data share groups.</strong>  These allow us patients &#8211; us individuals to own and control our personal medical history records.  We can choose who we allow to view and add to our records.  And they can&#8217;t be tampered with.  That&#8217;s real power in the hands of the people.  </p>
<p>Some healthcare blockchain companies and projects focus on the <strong>validation of drug history, DNA info, etc</strong>. This is similar to <em><strong>traceability</strong></em> that supply chains are generally concerned with.  Knowing the history or the full life path of who touched an item from raw material and out and into the marketplace, is important for controlling quality, safety, and accountability for problems.</p>
<p>Other blockchain tech companies just create <strong>data network protocols</strong> (the code stuff) <strong>or hardware</strong> (like crypto currency wallets).  These support products and services advance the practicality and usefulness of blockchain in healthcare.</p>
<p>&nbsp;</p>
<h2>Why Aren&#8217;t We All Using Blockchain?</h2>
<p><strong>What&#8217;s the Holdup? We need trusted, secure solutions today!<br /></strong></p>
<h3><strong>The Performance Problem</strong></h3>
<p>Blockchains also suffer from a capacity problem. That’s the reason one crypto currency has not really won out yet. Each transaction must be written somewhere. Therefore, the greatest strides have been done through supply chain. Once the object has been delivered, it can be archived or erased. Food is the one application that holds the greatest promise. A head of lettuce grown in a field can be tracked until sold. If a contamination is discovered, tracking to the field, within a farm, can be pulled out of the blockchain in an instant.</p>
<p><em><strong>Cons for using blockchain are processing speed and resources needed</strong></em>. It can consume a lot of computing power to solve the complex cryptographic equations for validating a record to be added to a chain. For crypto currencies, this is one way you get paid &#8211; by &#8220;mining&#8221; or by computing a new record. It takes time, so fewer transactions per second and computing power and electrical power. Both cost money&#8230;real money. : )</p>
<p>&nbsp;</p>
<p>Healthcare faces the same limits as currency. People live a long time. Each prescription, procedure, etc. must be kept for the life of the individual. The cloud is not limitless. Everything has a capacity.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/is-blockchain-a-security-savior-for-healthcare-and-us-all/">Is Blockchain a Security Savior for Healthcare and Us All?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data Security Risks and Importance of Cybersecurity</title>
		<link>https://aditigroup.com/data-security-risks-and-importance-of-cybersecurity/</link>
		
		<dc:creator><![CDATA[Cyber Guru]]></dc:creator>
		<pubDate>Tue, 11 Oct 2022 15:35:11 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data hack]]></category>
		<category><![CDATA[IT security]]></category>
		<category><![CDATA[LAUSD]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=933</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/data-security-risks-and-importance-of-cybersecurity/">Data Security Risks and Importance of Cybersecurity</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_1">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1000" height="1000" src="https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1.jpg" alt="Aditi Group cybersecurity interview podcast " title="Podcast-S4E6-Cybersecurity-part-1" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1.jpg 1000w, https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1-980x980.jpg 980w, https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1000px, 100vw" class="wp-image-937" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Listen in as we kick off Cybersecurity Month with another great interview by Dorothy Cociu on the Benefits Executive Roundtable.  In this show we discuss hot security topics and security breaches in 2022 and 2021.  Find out what&#8217;s been happening and what you can avoid being a statistic!</p>
<p>Listen and follow the podcast series Benefits Executive Roundtable: </p>
<p><a href="https://advancedbenefitconsulting.com/s4e6-data-security-risks-and-importance-of-cybersecurity-part-1/?">https://advancedbenefitconsulting.com/s4e6-data-security-risks-and-importance-of-cybersecurity-part-1/?</a></p></div>
			</div><div class="et_pb_module et_pb_code et_pb_code_1">
				
				
				
				
				<div class="et_pb_code_inner"><iframe loading="lazy" src="https://anchor.fm/benefitsexecroundtable/embed/episodes/S4E6---Data-Security-Risks-and-Importance-of-Cybersecurity--Part-1-e1p2a1k" height="102px" width="400px" frameborder="0" scrolling="no"></iframe></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/data-security-risks-and-importance-of-cybersecurity/">Data Security Risks and Importance of Cybersecurity</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>8th Annual World Password Day &#8211; Have We Learned Yet?</title>
		<link>https://aditigroup.com/8th-annual-world-password-day-have-we-learned-yet/</link>
		
		<dc:creator><![CDATA[Security Expert]]></dc:creator>
		<pubDate>Thu, 05 May 2022 19:08:02 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[2-factor]]></category>
		<category><![CDATA[default]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[World Password Day]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=840</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/8th-annual-world-password-day-have-we-learned-yet/">8th Annual World Password Day &#8211; Have We Learned Yet?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_2">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1200" height="800" src="https://aditigroup.com/data-privacy/wp-content/uploads/password-security-1200.jpg" alt="" title="" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/password-security-1200.jpg 1200w, https://aditigroup.com/data-privacy/wp-content/uploads/password-security-1200-980x653.jpg 980w, https://aditigroup.com/data-privacy/wp-content/uploads/password-security-1200-480x320.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" class="wp-image-843" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>8th Time, No Charm</h2>
<p>Today marks the 8th annual World Password Day as first started by Intel in 2013.  So, the question is: have we learned anything since the first Password Day?  Have we become any more secure?</p>
<p>&nbsp;</p>
<h2>Survey Says</h2>
<p>2021 and 2022 surveys from password keeper software companies like LastPass and NordPass and telecom providers like Verizon all say NO.   Recent surveys still, sadly point to top, most commonly used ones as:</p>
<ul>
<li>123456</li>
<li>password</li>
<li>qwerty</li>
<li>password1</li>
<li>variations on these age old defaults</li>
</ul>
<p>&nbsp;</p>
<h2>Make Your Move</h2>
<p>With lots of articles reminding us this week, we urge you to take this moment to become more secure.</p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_1_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et_pb_column_empty">
				
				
				
				
				
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Aditi&#8217;s password security recommednations include:</h3>
<h4>A)  Use 8-10 characters or more</h4>
<h4>B)  Include mixed letters, numbers, upper/lower case, special characters</h4>
<h4>C)  No names, dates, or easily guessed personal info about you</h4>
<h4>D)  Unique &#8211; don&#8217;t re-use paswords for multiple accounts</h4>
<h4>E)  Don&#8217;t leave them lying around</h4>
<h4>F)  Use multifactor or 2-factor authentication too</h4></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child et_pb_column_empty">
				
				
				
				
				
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Keep Passwords Locked Up</h2>
<p>Use some kind of password record keeper so you use LONG, STRONG, and UNIQUE passwords.  If you are trying to relying on remembering all your passwords, you&#8217;ll be too tempted to use the same one everywhere or keep them too simple or based on info about you that others could find on social media.  There are lots of solutions including web based and offline, locally stored software tools.</p>
<p>Contact us for more ideas and help in getting your business into safer territory and out of the past.</p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/8th-annual-world-password-day-have-we-learned-yet/">8th Annual World Password Day &#8211; Have We Learned Yet?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Basics of Social Engineering</title>
		<link>https://aditigroup.com/the-basics-of-social-engineering/</link>
		
		<dc:creator><![CDATA[Ted Mayeshiba]]></dc:creator>
		<pubDate>Thu, 04 Jun 2020 00:13:47 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Personal Privacy Invasion]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[Health Insurance Portability and Accountability Act]]></category>
		<category><![CDATA[HIPAA breach]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=441</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/the-basics-of-social-engineering/">The Basics of Social Engineering</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_11  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><!-- divi:paragraph --></p>
<h2 style="text-align: justify;">Where Are You Most Vulnerable?</h2>
<p style="text-align: justify;"><strong>Hackers understand that <em>employees</em> are often the weakest link in an organization’s security. That’s why 98% of cyber attacks rely on some type of social engineering, costing companies $billions every year.</strong></p>
<p>Are you familiar with these new Cyber criminal techniques that can leverage ANY connected employee to breach your security?</p>
<p><strong>As an increasing number of employees are forced to work remotely during the COVID-19 crisis</strong>, IT networks have become even more vulnerable to cyber-attack, especially when users connect over unsecure Wi-Fi and/or Home Networks with their personal devices.</p>
<p>In addition to raising awareness about new security threats for your employees, we’ve included 8 tips to help teleworkers (and any connected employees) improve security. You’ll also see recommendations on how ongoing Cyber Security Awareness Training is crucial to a strong defense.</p>
<p>While users are regularly encouraged to keep their anti-virus definitions and software up-to-date, 6% percent of users NEVER receive any type of security awareness training, while another 33% receive only once per year or when they join the company.</p>
<p>&nbsp;</p>
<h3>Key Security Lingo</h3>
<p>Every employee should also become familiar with the latest phishing and ransomware strategies to prevent becoming that weak link.</p>
<h4 style="padding-left: 30px;">Phishing (or Spear Fishing)</h4>
<h4 style="padding-left: 30px;">Vishing</h4>
<h4 style="padding-left: 30px;">Pretexting</h4>
<h4 style="padding-left: 30px;">Business E-Mail Compromise (BEC)</h4>
<h4 style="padding-left: 30px;">Baiting</h4>
<p>From an IT Security perspective, the term “social engineering” refers to cybercriminals using any number of psychological tricks to get users to perform actions (click on an email or link) or divulge personal or confidential information.<br /> While technical hackers seek vulnerabilities in the networks or software, social engineering cybercriminals exploit an end user’s tendency to trust.</p>
<p>Other types of social engineering may include creating distrust, or starting conflicts by altering private or corporate communications. There are literally thousands of variations to social engineering attacks, limited only by the criminal’s imagination.</p>
<p><strong></strong></p>
<h3>Phishing (or Spear Fishing)</h3>
<p>Phishing is the most common type of social engineering attack. Hackers pose as a trusted source (a friend, boss, colleague, bank official, government agency, etc.) and concoct a seemingly logical scenario for handing over login credentials or other sensitive personal data.</p>
<p>The cybercriminal may obtain your email address from a compromised email account or web directory and then go “Phishing,” sending general emails to everyone, or go “spear fishing,” personalizing an email for just you.</p>
<p>The email will contain:</p>
<ul>
<li>A link that you just have to click on, taking you to a website that asks for your personal information and/or automatically downloads malware</li>
<li>An attachment of pictures, music, movie, document, etc., that has malicious software embedded. </li>
</ul>
<p>&nbsp;</p>
<h3>Vishing</h3>
<p>Another type of phishing, using voice instead of text. The cybercriminal recreates an IVR (Interactive Voice Response) system of a trusted company, attaches it to a toll-free number and tricks you into responding to the cell phone prompts with your personal information.</p>
<p>&nbsp;</p>
<h3>Pretexting</h3>
<p>Pretexting is a social engineering technique of presenting oneself as someone else in a fictional situation in order to obtain private information.</p>
<p>This may be another phishing exploit, or use baiting techniques, but it’s all about developing a believable story, which may include:</p>
<p><span style="text-decoration: underline;">Urgent request for help</span>. Your ’friend’ is stuck in another country and needs money to get home or to pay a fine. Or the CEO sends an email titled “URGENT!!!!!,” with a message containing spelling mistakes.</p>
<p>Ask you to donate to a fundraiser, or some other cause. Disaster relief, political campaign, or charity needs money and/or your personal information to keep you informed.</p>
<p>Notify you that you’re a ‘winner.’ This phishing attack claims to be from a lottery, or a dead relative, or the millionth person to click on their site, etc. In order to receive your “prize” you will need to provide your bank routing number along with other details to steal your identity.</p>
<p>Pose as tech support or other professional. Also considered a “Quid Pro Quo” attack, the cyber-criminal is responding to an issue, and requests information, and/or a download of a scanner (malicious software) to scan your system. The criminal may be quite helpful and provide productivity tips while stealing your identity.</p>
<p>&nbsp;</p>
<h3>Serious Business Pre Text</h3>
<p>One form of pretexting, called <strong>Business E-Mail Compromise (BEC)</strong> uses a variety of tactics to con the company into wiring funds. The cybercriminal group likely gains access through spear-phishing and/or malware, and then spends weeks or months discovering the organization’s billing process, vendor payments, and the CEO’s email style and travel schedule.<br /> Then when the CEO is out of office, the scammers send a targeted email posing as the CEO to the finance officer (bookkeeper, accountant, controller, or CFO ) requesting an immediate wire transfer. The vendor will sound familiar though the account numbers will be slightly different.</p>
<p>If undetected, the initial and subsequent requests will cost the company thousands if not hundreds of thousands of dollars.</p>
<p>&nbsp;</p>
<h3>Baiting</h3>
<p>This type of social engineering scheme dangles malicious devices inside a seemingly harmless carrier, hoping someone will “take the bait.”</p>
<p>These schemes are often found on Peer-to-Peer sites offering a recent movie, or music to download, but they’re also found on social networking sites, job posting sites, online auctions and e-commerce sites.</p>
<p><!-- /divi:paragraph --></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/the-basics-of-social-engineering/">The Basics of Social Engineering</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Does HIPAA Still Apply with Work at Home and COVID-19?</title>
		<link>https://aditigroup.com/does-hipaa-still-apply-with-work-at-home-and-covid-19/</link>
		
		<dc:creator><![CDATA[Security Expert]]></dc:creator>
		<pubDate>Mon, 27 Apr 2020 21:29:36 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[HHS]]></category>
		<category><![CDATA[HIPAA breach]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[phone calls]]></category>
		<category><![CDATA[secure email]]></category>
		<category><![CDATA[sms]]></category>
		<category><![CDATA[text message]]></category>
		<category><![CDATA[waiver]]></category>
		<category><![CDATA[Zoom]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=431</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/does-hipaa-still-apply-with-work-at-home-and-covid-19/">Does HIPAA Still Apply with Work at Home and COVID-19?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
								<div class="et_pb_column et_pb_column_4_4 et_pb_column_12  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_10  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>City, State, and Federal agencies have variously required or advised that offices should be closed and workers have transitioned to work in their own homes.  Does this mean that HIPAA requirements no longer apply?  This is an emergency situation right?  Surely some of the rules don&#8217;t apply now.</p>



<h2 class="wp-block-heading">Limited Waiver</h2>



<p>The Department of Health and Human Services announced with a special bulletin that a limited waiver is in place. Does it release all business associates and covered entities from HIPAA rules? </p>



<p><a href="https://www.hhs.gov/sites/default/files/hipaa-and-covid-19-limited-hipaa-waiver-bulletin-508.pdf">https://www.hhs.gov/sites/default/files/hipaa-and-covid-19-limited-hipaa-waiver-bulletin-508.pdf</a></p>



<h2 class="wp-block-heading">Safeguarding Patient Information</h2>



<p>In an emergency situation, covered entities must continue to implement reasonable safeguards to protect patient information against intentional or unintentional impermissible uses and disclosures. Further, covered entities (and their business associates) must apply the administrative, physical, and technical safeguards of the HIPAA Security Rule to electronic protected health information.</p>



<h2 class="wp-block-heading">Securing Communictions</h2>



<p>HHS says that covered entities and BAs are still responsible for secure communications.  Email, phone calls, text messaging are often used in unsecure ways.  Remember, when you&#8217;re working at home, you still need to use private and HIPAA compliant electronic communication methods to converse with patients or other associates and agencies.   </p>



<p>So, keep it secure with DATA and your health!</p></div>
			</div>
			</div>			
				
				
				
				
			</div>		
				
				
			</div><p>The post <a href="https://aditigroup.com/does-hipaa-still-apply-with-work-at-home-and-covid-19/">Does HIPAA Still Apply with Work at Home and COVID-19?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>OCR Imposters &#8211; Office for Civil Rights Investigators, Are They Real?</title>
		<link>https://aditigroup.com/ocr-imposters-office-for-civil-rights-investigators-are-they-real/</link>
		
		<dc:creator><![CDATA[Security Expert]]></dc:creator>
		<pubDate>Sat, 04 Apr 2020 20:09:01 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[Health and Human Services]]></category>
		<category><![CDATA[HHS]]></category>
		<category><![CDATA[HIPAA violations]]></category>
		<category><![CDATA[imposters]]></category>
		<category><![CDATA[Investigators]]></category>
		<category><![CDATA[OCR]]></category>
		<category><![CDATA[Office for Civil Rights]]></category>
		<category><![CDATA[scam]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=407</guid>

					<description><![CDATA[<p>Thieves Are Hitting People in Times of Stress HHS has published several warnings recently, including this statement on April 3rd, that businesses should be ever vigilant against imposters posing as HHS / OCR investigators. April 3, 2020 Alert: Individual Posing as OCR Investigator It has come to OCR’s attention that an individual posing as an [&#8230;]</p>
<p>The post <a href="https://aditigroup.com/ocr-imposters-office-for-civil-rights-investigators-are-they-real/">OCR Imposters &#8211; Office for Civil Rights Investigators, Are They Real?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading">Thieves Are Hitting People in Times of Stress</h3>



<p>HHS has published several warnings recently, including this statement on April 3rd, that businesses should be ever vigilant against imposters posing as HHS / OCR investigators. <br></p>



<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:8%"></div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:84%">
<p><strong>April 3, 2020</strong></p>



<p><strong>Alert: Individual Posing as OCR Investigator</strong></p>



<p>It has come to OCR’s attention that an individual posing as an OCR Investigator has contacted HIPAA covered entities in an attempt to obtain protected health information (PHI).&nbsp; The individual identifies themselves on the telephone as an OCR investigator, but does not provide an OCR complaint transaction number or any other verifiable information relating to an OCR investigation.&nbsp;</p>



<p>HIPAA covered entities and business associates should alert their workforce members, and can take action to verify that someone is an OCR investigator by asking for the investigator’s email address, which will end in @hhs.gov, and asking for a confirming email from the OCR investigator’s hhs.gov email address.&nbsp; If organizations have additional questions or concerns, please send an email to: <a href="mailto:OCRMail@hhs.gov">OCRMail@hhs.gov</a>.</p>



<p>Suspected incidents of individuals posing as federal law enforcement should be reported to the Federal Bureau of Investigation (FBI).&nbsp; The FBI issued a public service announcement about COVID-19 fraud schemes at:</p>



<p><a href="https://www.ic3.gov/media/2020/200320.aspx.">https://www.ic3.gov/media/2020/200320.aspx.</a></p>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:8%"></div>
</div>



<h2 class="wp-block-heading">Why Are People Posing As HHS Investigators?</h2>



<h3 class="wp-block-heading">HIPAA Spells Fear</h3>



<p>For most people who fall under the auspices of the Health Insurance Portability and Accountability Act, aka HIPAA, the terms instill a dread of burdensome policies and obscure reference documents and of punishment for failure to meet the rules.  HIPAA penalties include massive potential monetary fines.  In the most extreme cases, there is no legal dollar cap.   And perhaps worse for individuals, the potential for jail time for violation.  </p>



<h3 class="wp-block-heading">Scams Operate on Fear</h3>



<p>Many scam artists take advantage of fears that people may have.  The IRS, FBI, or now, HHS / OCR is calling.   When people are stressed or afraid, they often divulge information that they otherwise would keep private.  The scammer questions tend to follow the line of creating the panic or stress, then requesting info from people &#8211; your name, account numbers, social security numbers, etc.  These bits of data are the keys they want.  These are the keys to create false identities, credit fraud, or simply to hack into online accounts and ultimately bigger prizes.</p>



<h2 class="wp-block-heading">Stay Calm, Stay Professional</h2>



<p>Investigators from any government agency don&#8217;t need to pressure people.  They don&#8217;t need to and don&#8217;t tend to rush.  If they are ever investigating a case, they are careful, diligent, and patient because they are after the truth.  They know that rushing leads to incomplete data and more often, wrong data.  </p>



<p>You can stay calm and professional, and know what if they contacted you, they know who you are.  They don&#8217;t need you to reveal private data. </p>



<p>If you do receive questionable calls, emails, or personal visitors, check with the agencies.   Remember this comment from HHS:</p>



<p><span class="has-inline-color has-vivid-red-color"><strong><em>HIPAA covered entities and business associates should alert their workforce members, and can take action to verify that someone is an OCR investigator by asking for the investigator’s email address, which will end in @hhs.gov, and asking for a confirming email from the OCR investigator’s hhs.gov email address.</em></strong></span></p>
<p>The post <a href="https://aditigroup.com/ocr-imposters-office-for-civil-rights-investigators-are-they-real/">OCR Imposters &#8211; Office for Civil Rights Investigators, Are They Real?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
