What Triggers A Breach Notification Under The HIPAA/HITECH Act?

Let’s first review few items before we discuss when a breach notification is triggered. HIPAA: The Health Insurance Portability and […]

How to Protect PHI Stored in a MySQL Server?

Unlike end-user workstations, mission-critical application servers like MySQL are high value targets. The MySQL database depends on the operating system […]