{"id":301,"date":"2014-05-27T10:21:00","date_gmt":"2014-05-27T10:21:00","guid":{"rendered":"https:\/\/ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers.html"},"modified":"2014-05-27T10:21:00","modified_gmt":"2014-05-27T10:21:00","slug":"keylogging-and-hipaa-breaches-whats-hiding-in-your-computers","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/","title":{"rendered":"Keylogging and HIPAA Breaches.\u00a0 What\u2019s Hiding In Your Computers?"},"content":{"rendered":"

\"keyloggerThe University of California, Irvine Student Health Center has been the victim of a HIPAA breach.\u00a0 Nearly 2,000 pieces of PHI (protected health information), including financial data, were stolen via a keylogger attack.\u00a0 The keylogger collected this information for over a period of a month before being discovered.<\/p>\n

How This Happened.<\/strong>\u00a0<\/strong><\/p>\n

The keylogger was residing in malware that was unknowingly running in the Center\u2019s operating system. Every keystroke their staff made was detected by the malware software and collected by the criminal.<\/p>\n

How to Protect Your Business From Keyloggers.<\/strong><\/p>\n

The best way is to arrange for a professionally managed, layered anti-virus, anti-spam, firewall solution.\u00a0 This will block the keylogging malware from entering your system in the first place.<\/p>\n

You can also benefit from using a Password Management Solution to ensure you use a different password with every site you logon to.<\/p>\n

Don\u2019t Be The Next Victim of a HIPAA Breach<\/strong>\u00a0<\/strong><\/p>\n

According to the U.S. Department of Health and Human Services (HHS), HIPAA breaches affected more than 2.6 million patients over the past five years. And with the ever-more-sophisticated cyber attacks today, this number is expected to increase.<\/p>\n

The only solution is a good defense.\u00a0 {company} can provide the comprehensive, layered protection your healthcare organization or business needs to protect your confidential information.\u00a0 For a complimentary security assessment of your technology, call {phone} or email us at: {email} Don\u2019t be the next statistic, victim or business that HHS fines.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"

The University of California, Irvine Student Health Center has been the victim of a HIPAA breach.\u00a0 Nearly 2,000 pieces of PHI (protected health information), including financial data, were stolen via a keylogger attack.\u00a0 The keylogger collected this information for over a period of a month before being discovered. How This Happened.\u00a0 The keylogger was residing…<\/p>\n","protected":false},"author":5,"featured_media":302,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-301","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"\nKeylogging and HIPAA Breaches.\u00a0 What\u2019s Hiding In Your Computers? - IT Services in Virginia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keylogging and HIPAA Breaches.\u00a0 What\u2019s Hiding In Your Computers? - IT Services in Virginia\" \/>\n<meta property=\"og:description\" content=\"The University of California, Irvine Student Health Center has been the victim of a HIPAA breach.\u00a0 Nearly 2,000 pieces of PHI (protected health information), including financial data, were stolen via a keylogger attack.\u00a0 The keylogger collected this information for over a period of a month before being discovered. How This Happened.\u00a0 The keylogger was residing…\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/\" \/>\n<meta property=\"og:site_name\" content=\"IT Services in Virginia\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-27T10:21:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ntegrait.com\/wp-content\/uploads\/2014\/05\/keylogger-hipaa.jpg\" \/>\n<meta name=\"author\" content=\"Steve West\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve West\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/\",\"url\":\"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/\",\"name\":\"Keylogging and HIPAA Breaches.\u00a0 What\u2019s Hiding In Your Computers? - IT Services in Virginia\",\"isPartOf\":{\"@id\":\"https:\/\/www.ntegrait.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2014\/05\/keylogger-hipaa.jpg\",\"datePublished\":\"2014-05-27T10:21:00+00:00\",\"dateModified\":\"2014-05-27T10:21:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/#primaryimage\",\"url\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2014\/05\/keylogger-hipaa.jpg\",\"contentUrl\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2014\/05\/keylogger-hipaa.jpg\",\"width\":413,\"height\":416},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ntegrait.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Keylogging and HIPAA Breaches.\u00a0 What\u2019s Hiding In Your Computers?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ntegrait.com\/#website\",\"url\":\"https:\/\/www.ntegrait.com\/\",\"name\":\"IT Services in Virginia\",\"description\":\"Ntegra IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ntegrait.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79\",\"name\":\"Steve West\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g\",\"caption\":\"Steve West\"},\"description\":\"Ntegra IT is devoted to providing reliable Computer Support to businesses that want to improve productivity and profitability. We deliver custom designed Network Services that better map to your business, so you can stop worrying about your technology and get back to achieving your business goals.\",\"url\":\"https:\/\/ntegrait.com\/author\/swestntegrait-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Keylogging and HIPAA Breaches.\u00a0 What\u2019s Hiding In Your Computers? - IT Services in Virginia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/","og_locale":"en_US","og_type":"article","og_title":"Keylogging and HIPAA Breaches.\u00a0 What\u2019s Hiding In Your Computers? - IT Services in Virginia","og_description":"The University of California, Irvine Student Health Center has been the victim of a HIPAA breach.\u00a0 Nearly 2,000 pieces of PHI (protected health information), including financial data, were stolen via a keylogger attack.\u00a0 The keylogger collected this information for over a period of a month before being discovered. How This Happened.\u00a0 The keylogger was residing…","og_url":"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/","og_site_name":"IT Services in Virginia","article_published_time":"2014-05-27T10:21:00+00:00","og_image":[{"url":"https:\/\/www.ntegrait.com\/wp-content\/uploads\/2014\/05\/keylogger-hipaa.jpg","type":"","width":"","height":""}],"author":"Steve West","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Steve West","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/","url":"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/","name":"Keylogging and HIPAA Breaches.\u00a0 What\u2019s Hiding In Your Computers? - IT Services in Virginia","isPartOf":{"@id":"https:\/\/www.ntegrait.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/#primaryimage"},"image":{"@id":"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/#primaryimage"},"thumbnailUrl":"https:\/\/ntegrait.com\/wp-content\/uploads\/2014\/05\/keylogger-hipaa.jpg","datePublished":"2014-05-27T10:21:00+00:00","dateModified":"2014-05-27T10:21:00+00:00","author":{"@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79"},"breadcrumb":{"@id":"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/#primaryimage","url":"https:\/\/ntegrait.com\/wp-content\/uploads\/2014\/05\/keylogger-hipaa.jpg","contentUrl":"https:\/\/ntegrait.com\/wp-content\/uploads\/2014\/05\/keylogger-hipaa.jpg","width":413,"height":416},{"@type":"BreadcrumbList","@id":"https:\/\/www.ntegrait.com\/keylogging-and-hipaa-breaches-whats-hiding-in-your-computers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ntegrait.com\/"},{"@type":"ListItem","position":2,"name":"Keylogging and HIPAA Breaches.\u00a0 What\u2019s Hiding In Your Computers?"}]},{"@type":"WebSite","@id":"https:\/\/www.ntegrait.com\/#website","url":"https:\/\/www.ntegrait.com\/","name":"IT Services in Virginia","description":"Ntegra IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ntegrait.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79","name":"Steve West","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g","caption":"Steve West"},"description":"Ntegra IT is devoted to providing reliable Computer Support to businesses that want to improve productivity and profitability. We deliver custom designed Network Services that better map to your business, so you can stop worrying about your technology and get back to achieving your business goals.","url":"https:\/\/ntegrait.com\/author\/swestntegrait-com\/"}]}},"_links":{"self":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts\/301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/comments?post=301"}],"version-history":[{"count":0,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts\/301\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/media\/302"}],"wp:attachment":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/media?parent=301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/categories?post=301"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/tags?post=301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}