Share this on:
 E-mail
11
VIEWS
0
COMMENTS
 
SHARES
About this iReport
  • Not verified by CNN

  • Click to view ArizonaSEO's profile
    Posted December 7, 2012 by
    ArizonaSEO
    Location
    Phoenix, Arizona
    Assignment
    Assignment
    This iReport is part of an assignment:
    Tech talk

    More from ArizonaSEO

    Phoenix Synergy discusses securing computer networks

     

    Phoenix, AZ, November 10, 2012: James Isdahl of Phoenix Synergy discussed the threat of "complacency" when speaking at the conference he was invited to for a group of Podiatrists at their AZPMA conference in Las Vegas, Nevada. He goes on to explain that although the doctors believe they are in compliance because the security of the software they run, the network around them may be their biggest risk.


    In an effort to help maximize their ePHI (electronic protected health information) security, AZPMA invited Phoenix Synergy, a leader in the network security industry, to discuss the importance of increasing network security by safeguarding against external and internal threats from hackers, poor firewall management and non-encrypted laptops. ePHI refers to all methods in which stored protected information is being transmitted, or received electronically and must be secured in accordance with the HIPAA Security Rule.
    Adam Yax, CTO of Phoenix Synergy stated, “HIPPA Compliance is the driving force behind the medical industries’ procedures that doctors’ offices across the US use to secure their networks. Often Doctors use software that is compliant, but their office network is not.”


    Providing the conference with a list of the most overlooked and common mistakes many people make by assuming that all systems are secure, Phoenix Synergy discussed how to assess the danger areas in a network or security system and what can be done to advert some common mistakes made by doctors. Some of these mistakes include unsecure or outdated security in wireless services, unlocked and insecure IT rooms, not enforcing password change policies and allowing privileged information to be viewed as it is entered into the software.

     

    “Small businesses make the mistake in assuming that because they have some kind of firewall installed on their system, they are safe from hackers. This is not the case, and a lot of the security risk can occur from disgruntled employees. Installing a password change policy is just one step to increase those security systems,” stated Mr. Isdahl.
    In order to prevent security breaches and to avoid being in non-compliance with HIPPA regulations, Phoenix Synergy strongly urges those in the medical field to perform periodic security assessments. A single breach can cost more financially than replacing, upgrading or consistently assessing a network for potential risks.


    About Phoenix Synergy
    Phoenix Synergy has worked closely with small and medium-sized businesses for over a decade by utilizing their broad range of expertise to create real synergy for businesses through Phoenix. They succeed when their client succeeds. Understanding the clients’ business requirements are essential in effectively responding to complex business challenges. Phoenix Synergy prides them-selves on finding a technical solution that result in the client’s return of investment. Their most popular services include database design, system architecture, networking, server support, website design, website hosting, application development, migrations, and many more. http://www.phoenixsynergy.com/about/

     

    Contact
    James Isdahl, CEO
    Adam Yax, CFO
    2432 E. Peoria Ave. Ste. 1022
    Phoenix, AZ 85029
    Office: 602-216-0960
    Fax: 602-216-0962
    jisdahl@phoenixsynergy.com
    ayax@pheonixsynergy.com
    www.phoenixsynergy.com

    What do you think of this story?

    Select one of the options below. Your feedback will help tell CNN producers what to do with this iReport. If you'd like, you can explain your choice in the comments below.
    Be and editor! Choose an option below:
      Awesome! Put this on TV! Almost! Needs work. This submission violates iReport's community guidelines.

    Comments

    Log in to comment

    iReport welcomes a lively discussion, so comments on iReports are not pre-screened before they post. See the iReport community guidelines for details about content that is not welcome on iReport.

    Add your Story Add your Story