TOP FIVE TIPS TO COMPLY WITH NEW HIPAA PRIVACY AND SECURITY RULES THAT TOOK EFFECT THIS WEEK

Our phones have been ringing off the hook the past few weeks (which is a good thing!) and we anticipate that this will continue as customers, prospects and partners work to get their arms around the new U.S. Department of Health and Human Services (HHS) Health Insurance Portability and Accountability Act (HIPAA) Omnibus Rule that [...]

Introducing Our Newest Partner: HealthGuard

We are excited to announce our new partnerships with HealthGuard, a health security and risk management services company. We are providing them with a full suite of Managed Security Services for their customers and partners, including HIPAA Essential, PCI Complete, managed firewall, intrusion detection and prevention, log management, and web application firewall (WAF). Additionally, HealthGuard [...]

Healthcare-record compliance is a SaaS problem too

Among companies handling patient records, the Health Information Technology for Economic and Clinical Health (HITECH) Act is old news. Going into effect in February 2009, this legislation sought to advance health information technology use standards to eventually make certain functions and safeguards mandatory, increasing the requirements for compliance with the Health Insurance Portability and Accountability [...]

New Gartner findings for PCI Compliance and the StillSecure PCI Calculator

Gartner recently released their Retail Security & Compliance Survey 2011 that details the costs associated with becoming PCI compliant. Excluding the cost of assessors – these costs are estimated at $1.7 million over the survey period, 2.35 years. Level 1s  spent approximately $2.1 million on PCI compliance and Level 2-4s approximately $1.1 million. In the [...]

Google & Facebook implementing two-factor Authentication, by Gabriel Bellas, SOC Analyst

In recent weeks, Google and Facebook users have noticed a sharp rise in their accounts being hacked. Since people keep some very sensitive information in their Gmail accounts, including their contacts, documents, etc, it is very important to make sure these accounts stay secure. To combat this problem, these sites have begun implementing two-factor authentication [...]

The Xilcter/Zeus Trojan, by Cesar Salas, SOC Analyst

Let’s take a look at the last 7 days of suspicious activity in which we find the Xilcter/Zeus Trojan running wild with an average of 864 unique events per customer. This is an average of over 120 per day. It’s becoming more and more evident that propagation of this Trojan has grown significantly. It seems [...]

Hackers targeting SecureID two-factor Authentication, by Gabriel Bellas, SOC Analyst

With the creation of brute force attacks, two-factor authentications have long since become the new standard for Network Security. Two-Factor authentications, as the name implies, uses two independent factors in conjunction to authenticate a person, generally resulting in a higher level of authentication assurance. By taking something you know such as a password and combining [...]

‘Don’t Leave Your IT Security to Luck’ Event in Boca March 17

    Lunch & Learn Session Co-Sponsored by Host.net and StillSecure BOCA RATON, FL (March 10, 2011) – Learn how to protect your enterprise data against attacks, whether you’re housing it locally or in the cloud, in “Don’t Leave Your IT Security to Luck,” a lunch-and-learn session from 11:30am-1:30 pm on Thursday, March 17 being [...]

StillSecure to offer Managed Security and Certified Compliance Solutions to Coresite customers

StillSecure Joins CoreSite’s CloudCommunity, Fostering Innovation and Thought Leadership on Cloud Security. Santa Clara, CA – March 10, 2011 — StillSecure®, a managed network security solutions and certified compliance company today announced at the Cloud Connect Conference, that the Company will provide its complete suite of managed security and certified compliance solutions for CoreSite’s data [...]

USB as a Vector of Network Attack By Diego Ramirez, SOC Analyst

Much of the time when we tend to think of exploits we consider the vector of attack being network infiltration. Even Hollywood’s romanticized notion of the hacker shows someone attacking from a dank dark basement using the internet to attack an organization, walking away with precious data. While this is a very real threat, some [...]