Skip to main content

Posts Tagged ‘security’

Looking Forward: Mobile Technology, Privacy and Security

Mobile Health, or “mHealth”, offers benefits throughout the healthcare industry. For clinicians, mHealth is a method to remotely monitor a patient’s health and improve the quality care rendered. For patients, mHealth provides a way to monitor their own health more easily and reduces the cost of care by decreasing the amount of time spend at […]

Will you protect PHI or Leave Patients Naked to the World?

Intimate medical details about your health is no longer stored safely in a dusty locked file cabinet. Thanks to the HITECH Act of 2009, your private health information will end up in data files that hundreds of healthcare workers may have the ability to access. However, in early 2003 the Department of Health and Human […]

Planning for Externalizing Authentication in SharePoint 2010: Part 1 – Introduction

Since the beginning of 2011, I’ve had the good fortune of being involved with several projects involving the claims authentication capabilities introduced in SharePoint 2010. The scope of these efforts have ranged from small proof-of-concept demonstrations to large Internet and Intranet production deployments. Some involved custom built Security Token Services (STS) and others relied on […]

Microsoft //BUILD Conference Webinar #2– How Windows 8 / Metro will Affect Enterprise IT, and How You Can Prepare

Date: October 27, 2011 Time: 1:00-2:00 PM EST Register Now! http://microsoftbuild2.eventbrite.com/ We have changed the date of this webinar to October 27, 2011. Windows 8 is a product that is initially both exhilarating and confusing. The Metro Style UI first experienced in Windows Phone 7 is at the forefront of Windows 8. It is fresh […]

403 Forbidden Error with iPhone When Accessing SharePoint 2010 in Claims Mode

If you’re looking to support iPhone on a SharePoint 2010 site that is configured to use an external identity provider like Ping Federate, ADFS 2.0, or a custom STS, you will likely run into this issue. However, you may notice everything works just fine with iPad. Fortunately, the issue can be reproduced on the desktop […]

Security and the Future of Healthcare

Poor IT security practices continue to plague the healthcare industry. Last year, a Ponemon Study found that poor security practices cost the healthcare industry $6 billion annually and that the HITECH Act has not resulted in changes to the approach taken to manage protected healthcare information. When an industry is under scrutiny for out-of-control escalating […]

Social Security Trimmer in SharePoint 2010

Social component in SharePoint 2010 is actively used in intranets. Users share thoughts, links and documents with other users using the functionality provided by SharePoint 2010. Users can tag pages which are a part of the intranet site or they can tag links which are external. Anytime any of the above actions occur, an activity […]

A little “gotcha” when Migrating “My Site” Content to SharePoint 2010 SAML Claims

We recently ran across an issue a customer was having with the migration of “My Site” content to SharePoint 2010. In their case, the target configuration was Claims Mode using an external STS for authentication. They upgraded their web application to claims-mode, converted the users to SAML claims principals, and then configured the User Profile […]

SharePoint security using the OSI model

I recently attended Microsoft Tech-Ed 2011 and had the chance to sit down with Mike DeVerter of Rackspace, a Perficient partner, after I presented at the conference about the 10 Immutable Laws of SharePoint Security. In this presentation, I talked about SharePoint security using the Open Systems Interconnection (OSI) model as a guide, covering where […]

A conversation about privacy, security, and UX

Last week, I followed, nearly real time via Twitter, how Sean Power successfully recovered his stolen laptop. The full story is available, but here are a few excerpted tweets from @SeanPower on 13 May 2011: If you’re getting up to speed: Laptop was taken 4 days ago, but I had to fly to Canada the […]

Customer trust and UX SLAs: Thoughts on the Epsilon email server breach

How many notices did you receive about the Epsilon email breach that was discovered on March 30? How did the news of that make you feel toward a compromised company you do business with? Even though only email addresses were stolen, did you wonder whether you needed to worry about more than just watching for […]

Boeing on the Cloud: Getting Started and Matching Requirements

Cloud is hot and Boeing has started to dip their toes in the water.  Jim Rubert gave a great presentation on options and pitfalls.  If you have access to the presentation, you should download it. Key Points In 2009, cloud hit the top of the hype cycle In 2010, they started into the trough of […]

Load More