Technology News & Learning Center
Topics
Podcast: 2025 HIPAA Proposed Rule Changes You Need to Know About
Feb 13, 2025 | Compliance, HIPAA, Podcast
Benefits Executive Roundtable Podcast Watch & Listen as Aditi Group's Ted Flittner covers ground on the recently proposed HIPAA Security Rule changes and how they can affect you. Dorothy Cociu discusses the recently released HIPAA Security Proposed Rules with Marilyn Monahan of Monahan Law Office and Ted...
HIPAA Training on New Regulations & Updates in 2025
Jan 24, 2025 | Compliance, HIPAA, Training
Get Ready for Changes! HIPAA new proposed regulations bring many new requirements for ALL Covered Entities big and small as well as for Business Associates. Learn about the changes in detail and about updates to HIPAA Reproductive Rights requirements. Two venues and dates to attend IN-PERSON March 18, 2025...
Stop Insider Theft & USB Drive-By with Zero Trust
Nov 18, 2024 | Aditi Zero Trust, Data Breach, Hackers, IT Solutions, Security Learning
Remember Physical Data Security Just like fortified castle defenses, most electronic data security focuses on the internet. Phishing emails, malicious websites, unsavory social media links, public Wifi connections, and weak passwords. All are potentially exploited by data thieves. But what about the old school...
3 Cybersecurity Strikes Against Marriott for $52 Million Settlement
Oct 23, 2024 | Data Breach, Hackers
Big Company, Big Breaches, Big Settlement If you've ever stayed at hotel, you've probably stayed with Marriott. Marriott International is the world's largest hotel company. Nearly 8900 properties in 141 countries and territories. Wow! That's a lot. They have another distinction: Marriott and now subsidiary...
How QuickBooks & Lacerte can weaken security and help hackers
Oct 10, 2024 | Hackers, Security Learning
What to do when your software needs Windows Admin rights: safely using QuickBooks & LacerteOverview Lacerte and QuickBooks require Administrative Windows user level permission to keep software updated. This is different than the various QuickBooks user level accounts within QuickBooks. Why does this matter? As...
What’s the Score? National Vulnerability Database
Apr 10, 2024 | Hackers, Malware, Security Alert, Security Learning
Weakness Scoring System Our Federal government division witin the Department of Commerce, under the National Institute of Standards and Technology, NIST, has a National Vulnerability Databaase designed to help the public, and especially the technical administrators of IT systems to guage potential weaknesses or...
Watch Your Keys – YubiKey Manager Advisory
Apr 10, 2024 | Security Alert
Security Advisory Yubico, maker of YubiKeys, issued this advisory of vulnerabilities in their software application YubiKey Manager GUI https://www.yubico.com/support/security-advisories/ysa-2024-01/WHO DOES THIS AFFECT? Keys are Good. Program has vulnerability. Only users of YubiKey Manager GUI versions perior to...
Is Blockchain a Security Savior for Healthcare and Us All?
Nov 3, 2022 | HIPAA, IT Solutions, Security Learning
The Goals of Blockchain: Trust and Security What is Blockchain? Blockchain explained for non-coders Blockchain is a way of recording that sequentially links every revision of a a record, in a distributed / shared log (or ledger for finance folks). Every transaction is recorded in an every growing record chain....
Data Security Risks and Importance of Cybersecurity
Oct 11, 2022 | Compliance, Data Breach, Hackers, HIPAA, Podcast, Security Learning
Listen in as we kick off Cybersecurity Month with another great interview by Dorothy Cociu on the Benefits Executive Roundtable. In this show we discuss hot security topics and security breaches in 2022 and 2021. Find out what's been happening and what you can avoid being a statistic! Listen and follow the podcast...
Cybersecurity 2.0 – The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments
May 20, 2022 | Data Breach, Hackers, IT Solutions, Security Learning, Uncategorized
Aditi co-founders Ted Mayeshiba and Ted Flittner are interviewed in this lengthy article written by Dorothy Cociu, President of Advanced Benefit Consulting. We invite you to learn more about current computer and phone electronic data security threats and how to avoid some of them. Highlight Topics Include Are...