Our documents are based on successfully executed projects which save you time and money.
business , compliances , security

HIPAA Defense in depth

March 15, 2010

HIPAA Compliance: Section                              Standard                                                      Specification 164.308(a)(1)              Security Management Process            Risk Management 164.308(a)(5)              Security Awareness Training              Log-in Monitoring 164.308(a)(6)              Security Incident Procedures              Response and Reporting 164.312(b)                   Audit Controls                                                Encryption and Decryption 164.312©(1)                Integrity                                              Mechanism automating PHI Scope: Data Applications Servers Subnets DPA policy control Network Requirements: 1) Triple factor Authentication 2) Access...

Img
compliances , security

Common Medical Applications – Information

March 14, 2010

  Common Medical Apps – Info Vendor Name Mainframe (MF), Mini (MN), Micro (MC) Application Software In-House Workstation (WS) Accounts Receivable HBOC MF Accounts Payable GEAC (AP:M) MF Acuity (Patient Classification) Medicus MF/MC Biomedical Equipment Maintenance In-House MF Blood Bank/Pathnet Cerner MN Cardiology Seattle WS Case Mix Management TSI...

Img
business , compliances , security

Healthcare Industry Segmentation

March 14, 2010

Healthcare Payers National Health Insurance Plans Federal Government (CMS – Medicare) State Government (DHHS – Medicaid) Healthcare Providers Hospitals Long-Term Care Facilities Physician Medical Practices Specialty Care Providers (Outpatient, Oncology, etc) Affiliated Organizations Clearinghouses, Third Party Administrators, etc. Key Business Drivers The revenue source of a hospital is driven...

Img
compliances , policies

HIPPA Setting Best Practices

March 14, 2010

HIPAA legislation does not lay out a specific, standardized course of action or “best practice.” Rather, the language often suggests “reasonable and appropriate” action to protect and secure business assets and protect private data. This openness puts the burden on providers and payers to chart new territory and implement...

Img
business , compliances

Sample End-to-End Performance Goals

March 13, 2010

End-To-End Performance                 Performance Goals System and Application Windows SAP GUI  End-to-end Performance ([Client] will consider these as goals and monitor the actual results): Macintosh JAVA GUI 90% of identified representative transactions complete:   <  3 seconds Windows HTML GUI 90% of identified representative transactions complete:   <  6 seconds  

Img
compliances , information-rights-management , security

Consderations for Securing your environment

March 13, 2010

Identify Access Points In the electronically open organization… • Who has access to your internal network? – Employees in the office or remote, using VPNs – Contractors, consultants, temporary workers – Customers, suppliers, and partners via extranet – Outsiders who have penetrated the perimeter • Operations and resources are becoming more distributed –...

Img
compliances , projects

Sample IT Wide Status Definitions

March 11, 2010

GREEN:  Project on schedule with no gating issues.  AMBER:  Significant issues with interim deliverable(s), possible Interim deliverable slips. However, final deliverable(s) is/are still achievable with proper attention/involvement. RED:  Serious issues.  Unlikely to make final deliverable MIS Status Amplifications: Amplification on status for MIS Integration Test Leads and Release Leads: ...

Img
compliances , security

Regulation Impact by IT Technology Domains

March 11, 2010

Sarbanes Oxley Act HIPAA Gramm-Leach-Bliley Act SEC 17a-4 and NASD and NASD Financial compliance, business process measurement applications X Enterprise resource planning X Business intelligence and data warehousing X Content/document  management and search X X X X Data/application integration X Business process automation X X Records management and email...

Img
compliances , networking , sample-it-spreadsheets , security

Sample Architectural Key Components Planning Document

March 11, 2010

Introduction Technology Component Name: Initiator: Problem/Opportunity Definition This is the problem or opportunity that caused the inception of the project. Business Drivers This section contains any business drivers that are associated with this component (if applicable). High Level Business Requirements This section provides the “what” of the business need....

Img
compliances , security , visio-stencils

Sample Visio – MIL-STD-100 and DOD-STD-1000

March 11, 2010

Free Visio Document download MIL-STD100_Sample.vsd The MIL-STD-100 and DOD-STD-1000 standards suck, they are vague and generally interpretive and un-atainable. Below are some recommendations for at least good guidelines. Items necessary for good network documentation Identification of servers, workstations, printers, routers, switches, etc. IP addresses NetBIOS/Host names MAC addresses Description...

Img
compliances , security

Wireless Security Checklist

March 10, 2010

Data collection: via Kismet. (freeware): · Is the access point (AP) beaconing? (Is the AP configured to send beacon packets?) · Is the access link layer encryption enabled? (Wireless Encryption Protocol) · Is strong link layer encryption enabled? (128 bit WEP) · What channel is the traffic broadcast on? · Is the network...

Img
compliances , security

Sample MIL-STD-100 Objectives

March 10, 2010

The primary objective of the Standard Operating Environment was to develop the platform baseline for the Network Management Systems for Corporate campuses (Corporate NSM).   This standard methodology would then be applied to all campuses in the implementation of the Enterprise Network Management Platform. · Detail the NSM solution including...

Img
compliances

Information system Catalog service management Considerations

March 8, 2010

Configuration and asset management Release Management Development Integration  Service Desk / Help Desk    Capacity management Create and maintain a capacity plan Operational procedures and responsibilities Documented operating procedures Change control procedures Technical review of applications after operating system changes Restrictions on changes to software packages Change management Information...

Img
compliances , information-rights-management , security

Identifying Identity Management Needs

March 8, 2010

Author unknown  Is your network a collection of different systems and applications? Are there multiple directories and data systems? Are there users and other data objects stored in multiple places? How is the environment managed? How are new accounts created for users each time a new application is added?...

Img
compliances , information-rights-management , security

Solaris Role-Based Access Controls

March 7, 2010

UNIX administrators have wanted more fine-grained access control to administrative features almost since the first administrator accidentally destroyed his first system. As of Solaris 8, Sun has delivered a solution to that problem. But is the solution for you? The Current State The UNIX concept of a “superuser” who...

Img
compliances , security , web-services

What is an x.509 Digital Certificate Structure

March 7, 2010

X.509 certificates have the following fields. Version x.509 version:  0=v1, 1=v2, 2=v3 serialNumber Controlled by CA, assigned to each cert signature algorithm OID of the algorithm used for digital signature issuer name Ex “sha1WithRSAEncryption” or “dsa-with-sha1” validity period x.500 Distinguished Name (DN) of the CA subject name Expiration date...

Img
business , compliances , networking , o-s , security

IT administrators are not doing enough to patch vulnerabilities

March 7, 2010

Stringent patching and patch management is key to anti-virus security management 1. Protection from malware 2. Secure connectivity 3. Protection from Inappropriate Content 4. Maximization of Network Resources 5. Protection of Resources 6. Ease of IT administration 7. Maximization of performance 8. Budget Management How to Secure Malware Threat...

Img
compliances , o-s , security

Event Viewer Log Review

March 5, 2010

It is important to frequently check the XP / Vista and Server Event Viewer to review log files for possible security concerns. It is optimal to log a minimum of seven days of activity in the application, system, and security logs. In order to maintain the information for seven...

Img
business , compliances , networking , security

Personal Computer / LAN Security Guidelines

February 28, 2010

Incorporate the following tips into your daily routine to ensure that any pc or LAN you use is secure · Lock your pc with a power on password · Lock your pc with a keyboard password when away from your desk · Back up your work regularly · Store and lock diskettes...

Img
business , compliances

Creating Customer Service

February 28, 2010

Everyone seems to agree customer service is critical but few practice what they preach.  The industry needs more than fancy rhetoric and catchy slogans to keep customers happy. What are needed is adequate service staffing, training, and supervision to make sure every effort is made to keep your customer’s...

Img
business , compliances , o-s

System Configuration Guidelines and Considerations

February 28, 2010

Hardware Inventory Complete evaluation of all existing hardware o   Configuration o   Date purchased o   Depreciated value o   Replacement cost o   Appropriateness of work Report by hardware item o   Present Cost o   Life expectancy o   New cost o   Depreciated value o   Repair costs o   Planned replacement date Software inventory o  ...

Img
compliances , security

What is a DoS Attack

February 28, 2010

A specific directed attempt by individuals to cripple or deny access to technology resources. Most Dos attacks are directed to Internet online services. Techniques: Resource Exhaustion Attacks Flood the victim (server) with packets Bandwidth Consumption Attacks Overload packet processing capacity Saturate network bandwidth Result of the attack Network starvation...

Img
compliances , security

Anatomy of a hack

February 28, 2010

1. Acquire target 2. Footprint the system 3. Gain entry to system 4. Escalate privileges 5. Exploit system resources 6. Leave backdoor for later 7. Clean up, get out, cover tracks Risk management · It’s not a matter of if a computer security breach will happen, it’s a matter of when, and how prepared will you...

Img
business , compliances , security

Websense Web Filtering Software Overview

February 27, 2010

How Websense Works Websense is based on pass-through filtering technology, the most accurate, reliable and scalable method of Internet filtering. Pass-through filtering requires all requests for Web pages to pass through an Internet control point such as a firewall, proxy server or caching device. Websense is integrated with these...

Img
compliances , policies , security

IT Auditing Standards Guidance

February 27, 2010

Guidelines provide guidance in applying IT Auditing Standards. The IT auditor should consider them in determining how to achieve Implementation of the standards, use professional judgment in their application and be prepared to justify any departure. The objective of the IS Auditing Guidelines is to provide further information on...

Img
business , compliances , security

IT Auditing Cobit Mapping

February 26, 2010

Linkage to COBIT COBIT Framework states, “It is management’s responsibility to safeguard all the assets of the enterprise. To discharge this responsibility as well as to achieve its expectations, management should establish an adequate system of internal control.” COBIT Management Guidelines provides a management-oriented framework for continuous and proactive...

Img
business , compliances , security

Checklist for Disaster Recovery

February 22, 2010

When reviewing disaster recovery plans, the first step is to determine the financial impact of data downtime. How long can your business remain afloat without your critical data? This information will affect your decisions concerning the sophistication and capabilities of your disaster recovery solution. Governmental regulations should also be...

Img
business , compliances , data-center-soc-noc , security

Sample Disaster Recovery Test Plan (Structure)

February 22, 2010

1.      Test Planning a.       Objectives b.      Test Procedures c.       Test Plan Review d.      Assumption Validation   2.      Test Scope a.       Orientation b.      Table Top c.       Functional d.      Full Scope   3.      Test  Coordinator and Team   4.      Result Analysis a.       Objectives Completed b.      Validity and accuracy of test data...

Img
compliances , networking , security

DoS

February 22, 2010

Aurthor unknown Whether launched by high school novices or savvy cyber-terrorists, Denial-of-Service (DoS) attacks have become a threat to network reliability. These attacks often result in considerable loss of time and money since they consume scarce and expensive resources: network bandwidth, memory and disk space, CPU time, access to...

Img
business , compliances , data-center-soc-noc

SOW Checklist Overview

February 21, 2010

Summary Requirements Scope Of Work In Scope Out Of Scope Term Assumptions, Risks And Constraints Assumptions Risks Constraints Deliverables And Acceptance Criteria Project Approach, Methods, And Tools Approach Methods Tools Facilities Office Locations Delivery Center Locations Environments Conversion Testing Project Management Project Plan      Work Descriptions      Schedule Team...

Img
business , compliances , security

Outsourcing

February 21, 2010

The most effective outsourcing model occurs when you develop a strong partnership with your supplier, hold regular high-level strategic reviews, and implement a process for continual improvement that is underpinned by both performance and client satisfaction measures. Maintaining quality, transparency, confidentiality and anonymity is paramount for a successful outsourcing...

Img