Please visit my profile website at tareqtujjar.me
Continue reading »About Me

Please visit my profile website at tareqtujjar.me
Continue reading »Technical news, tips about IT, security, web development, server administration, and HIPAA compliance. Check it out PracticalFacts.com
Continue reading »With the final Omnibus ruling of 2013 on HIPAA/HITECH and the increasing reports of hacking incidents – Check 4.5 million patient records stolen from Community Health Systems by Chinese Hackers – the cost of noncompliance with HIPAA can be substantial to providers and covered entities. With the potential for audits from the Office of Civil
Continue reading »A few days ago I wanted to signup and try an online service that I have heard a lot about and was featured in many blogs and online tech/business sites including TechCrunch, Mashable, and WSJ and has won many awards. During my signup process I noticed that the signup form where I am supposed to
Continue reading »Website development is becoming more and more complex. Having to accommodate for multiple landing pages, signup methods, and various platforms and browsers (mobile, tablet, desktop, android, apple, chrome, Firefox, etc..) it is very possible to overlook some security hole(s) somewhere. That can be the case for any website, and you should not trust a website
Continue reading »Community Health Systems announced on Monday that hackers recently broke into its computers and stole data on 4.5 million patients. The company operates over 206 hospitals in 28 states including Alabama, Florida, Mississippi, Oklahoma, Pennsylvania, Tennessee and Texas. Apparently the hack originated from China and used a high end malware to breach the companies network sometime in April
Continue reading »A former hospital employee in East Texas has been indicated by federal prosecutors for criminal violations of the Health Insurance Portability and Accountability Act (“HIPAA”). Allegedly the former employee obtained PHI with the intent to use the information for personal gain between December 1, 2012 through January 14, 2013. He has been indicated on charges
Continue reading »Risk Assessment otherwise called Risk Analysis is a Required part of the HIPAA Security Rule 164.308(a)(1). To ensure compliance, health care providers, medical offices (Covered Entity), business associates, or any other entity that receives, transforms, or stores Electronic Protected Health Records (ePHI) are required to perform a Risk Analysis at least once a year or
Continue reading »Online malicious hacking activities are on the rise. The latest news about Russian hackers stealing 1.2 billion usernames and passwords is a testament to how vulnerable we could be. Online activities is part of our daily life including banking, emails, social networking, and shopping. Having your password stolen could be very costly on all levels.
Continue reading »Someone allegedly has found a new clever way to buy products with fake or bad credit cards. He visited various Apple stores to purchase products. At the time of payment he provides four different debit/credit cards belonging to accounts that have been closed by the financial institutions. When the cards are declined by the Apple
Continue reading »