Flask Data – Clinical data management software

  • Customers
  • Articles
  • Solutions
    • Assess your clinical trial risk
    • Same day data and privacy solutions
Illustration of a bird flying.
  • 14 years after 9/11, more connected, more social, more violent

    Friday, today is the 14’th anniversary of the Al Queda attack on the US in New York on 9/11/2001. The world today is more connected, more always-on, more accessible…and more hostile. There are threats from Islamic terror, identity theft, hacking for pay, custom spyware, mobile malware, money laundering and corporate espionage. For those of us […]

    September 10, 2015
  • The importance of risk analysis for HIPAA compliance

    A chain of risk analysis The HIPAA Final Rule creates a chain of risk analysis and compliance from the hospital, downstream to the business associates who handle / process PHI for the hospital and sub-contractors who handle / process PHI for the business associate. And so on. The first thing an organization needs to do is a risk analysis. […]

    September 7, 2015
  • On Shoshin and Software Security

    I am an independent software security consultant specializing in medical device security and HIPAA compliance in Israel.   I use the state-of-the art PTA – Practical Threat Analysis tool to perform quantitative threat analysis and produce  a bespoke, cost-effective security portfolio for my customers that fits their medical device technology. There are over 700 medical device companies […]

    September 6, 2015
  • Dealing with DLP and privacy

    Dealing with DLP and privacy It’s a long hot summer here in the Middle East and with 2/3 of  the office out on vacation, you have some time to reflect on data security. Or on the humidity.  Or on a cold beer. Maybe you are working on building a business case for DLP technology like Websense or Symantec or Verdasys, or Mcafee or Fidelis in […]

    August 16, 2015
  • What is PHI?

    Software Associates specialize in HIPAA security and compliance for Israeli medical device companies – and 2  questions always come up: “What is PHI?” and “What is electronically protected health information?” Of course, you will have already Googled this problem and come to one conclusion or another by surfing sites like Hipaa Compliance Made Easy or the Wikipedia entry on HIPAA. […]

    June 1, 2015
  • 10 ways to detect employees who are a threat to PHI

    Software Associates specializes in software security and privacy compliance for medical device vendors in Israel.   One of the great things about working with Israeli medical device vendors is the level of innovation, drive and abundance of smart people. It’s why I get up in the morning. Most people who don’t work in security, assume […]

    May 25, 2015
  • The top 5 things a medical device vendor should do for HIPAA compliance

    We specialize in software security assessments, FDA cyber-security and HIPAA compliance for medical device vendors in Israel. The first question that every medical device vendor CEO asks us is “What is the fastest and cheapest way for us to be HIPAA-compliant”? So here are the top 5 things a medical device vendor should do in order to […]

    May 22, 2015
  • Shock therapy for medical device malware

    Israel has over 700 medical device vendors.  Sometimes it seems like half of them are attaching to the cloud and the other are developing mobile apps for all kinds of crazy, innovative applications like Healthy.io ( Visual Input Turned Into Powerful Medical Insight – translation: an app that lets you do urine analysis using your smart phone). […]

    May 12, 2015
  • The death of the anti-virus

    Does anti-virus really protect your data?   Additional security controls do not necessarily reduce risk. Installing more security products is never a free lunch and tends to increase the total system risk and cost of ownership, as a result of the interaction between the elements. We use the quantitative threat analysis tool – PTA that enables […]

    March 9, 2015
  • It’s friends and family breaching patient privacy – not Estonian hackers.

    A 2011 HIPAA patient privacy violation in Canada, where an imaging technician accessed the medical records of her ex-husband’s girlfriend is illustrative of unauthorized disclosure of patient information by authorized people. Data leakage of ePHI (electronic protected health information) in hospitals is rampant simply because a) there is a lot of it floating around and […]

    September 28, 2014
←Previous Page
1 2 3 4 5 … 49
Next Page→

Flask Data – Clinical data management software

Proudly powered by Flaskdata.io