What Triggers A Breach Notification Under The HIPAA/HITECH Act?

Let’s first review few items before we discuss when a breach notification is triggered. HIPAA: The Health Insurance Portability and […]

How to Protect PHI Stored in a MySQL Server?

Unlike end-user workstations, mission-critical application servers like MySQL are high value targets. The MySQL database depends on the operating system […]

How To Reduce Exposure To Your MySQL Server At The OS Layer?

Let’s first look at the three main OS level vulnerabilities that allow an attacker to breach security and get to […]