The most recent content from our members.
In my last post regarding IT and healthcare policy, we talked about the somewhat unique expectation of "extreme availability" within the environments we support. I shared some of my past experiences and learned a lot from the community interaction in the comments. Thanks for participating! That kind of interaction is what…
By Paul Parker, SolarWinds Federal & National Government Chief Technologist Here is an article from Federal Technology Insider on securing medical device networks, in which I was interviewed about how customers are using our tools to help with this issue. Connected devices have been an integral part of the healthcare world…
By Joe Kim, SolarWinds EVP, Engineering and Global CTO Within a healthcare environment, IT failure is not an option. This is a critical issue across the two largest federal entities: the DoD and the Department of Veterans Affairs (VA). In these agencies’ healthcare environments, there is no margin for error; the network…
In my previous blog, I discussed the somewhat unique expectations of high availability as they exist within a healthcare IT environment. It was no surprise to hear the budget approval challenges that my peers in the industry are facing regarding technology solutions. It also came as no surprise to hear that I’m not alone…
In my last blog post, we talked about protecting data at rest and data in motion. Thanks for all the really good comments and feedback you left. I think they gave us some good food for thought, especially a few items I hadn’t talked about, including mobile device security and management. In this post, I want to take things…
By Joe Kim, SolarWinds EVP, Engineering and Global CTO Though cybercriminals are usually incentivized by financial gain, the reality is that a cyber-attack can create far more damage than just hitting an organization fiscally. This is especially the case when it comes to healthcare organizations. Health data is far more…
My name is Josh Kittle and I’m currently a senior network engineer working for a large technology reseller. I primarily work with enterprise collaboration technologies, but my roots are in everything IT. For nearly a decade, I worked as a network architect in the IT department of one of the largest managed healthcare…
It has been more than 20 years since HIPAA was enacted on August 21, 1996, and in those two decades it has seen quite a bit of change – especially with regards to its impact on IT professionals. First, with the HITECH Act which established the privacy, security, and breach notification rules in 2003, and then the issuance…
It comes as no surprise that cyber intrusions and data breaches are increasing in the industry today given the sophistication in the threat landscape. We have seen catastrophic breaches in the recent times with the likes of Target, Neiman Marcus, Michaels, and many more. While cybersecurity protection looks vulnerable for…
It looks like you're new here. Sign in or register to get started.