
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"KSBbU4N6Fl\"><a href=\"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/\">Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/embed\/#?secret=KSBbU4N6Fl\" width=\"600\" height=\"338\" title=\"&#8220;Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks&#8221; &#8212; OTAVA\" data-secret=\"KSBbU4N6Fl\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Online Tech is liveblogging from Milwaukee at Rock IT Around the Clock! That\u2019s the theme for the HIMSS Midwest Area Chapters Fall Technology Conference November 10-12, where we\u2019re exhibiting our\u00a0HIPAA hosting solutions\u00a0at booth #501. Here&#8217;s our takeaways from a session on cyber security: Session: Cyber Attacks from Shanghai: Prepared? Speaker: Ali Pabrai Firewalls are our first line of defense! Antivirus control Many vulnerabilities enter the network via employees\u2019 email activities. Authentication control This is a critical area We struggle with password management and credential information. It can lead to more problems. Key: Encrypt all passwords during transmission and storage on all system components.\u00a0There are too many generic accounts (physician accounts, and nurse accounts, etc.) Implement two-factor authentication for remote access. We\u2019re going to get more, not less remote access When OCR does audits, one of the questions they ask is whether or not you have two-factor authentication. Especially people who have to meet more than just HIPAA requrements (like PCI), it\u2019s a mandate for other compliances Audit Log consolidation control. Establish process for linking all access to system components (especially privileged access such as root) to each individual. Implement automated audit trails for all system components to reconstruct the event....","thumbnail_url":"https:\/\/www.falltechnologyconference.org\/graphics\/t829l3\/fmw.jpg"}