krypted.com

Tiny Deathstars of Foulness

The increase in the use and complexity of technological assets in the healthcare sector has been on the rise in the recent past. Healthcare practitioners have moved from recording data manually to keeping Electronic Health Records. This eases the accessibility and the availability of data to the health practitioners. Further, electronically stored data makes it possible for patients to receive high quality and error-free care, improve decision making process because medical history is available and also makes it possible to provide safer and more reliable information for medication. Despite, the numerous advantages that the use of technology in healthcare has, there is also a threat of patients data leakage that lingers around. According to a research by Garrison and Posey (2012), medical identity theft has far more consequences in comparison to the typical identity theft. In average, every medical theft case can cost $20,000, and represents a substantial privacy violation. For this reason and more, it is important for healthcare institutions to protect patient data by securing technological assets within the institution. This article will explore the different methods used to secure the technological assets, with an emphasis on mobile devices.

The first method is limiting access to the electronic health records to only a few individuals. According to Gajanayake et al.(2014) suggests that there are different models of limiting access to the records. The first step is to ask for authentication, this will prompt them to verify their identity. This could be achieved by giving the authorized individuals unique passwords for identification and also by performing biometric scans of the individuals. This step will eliminate the possibility of unauthorized access to the technological access. The second step is to limit the type of information that one is supposed to access. This could be made possible using certain access models. Examples of models that have been proposed include Discretionary Access Control (DAC),Mandatory Access Control (MAC) and Role Based Access Control (RBAC). The DAC restricts access to certain commands such as’ write’, ‘read’ and ‘execute.MAC controls access by assigning information different levels of security levels. RBAC is based on the rights and permission that depend on the roles of an individual. These models normally apply to the security of electronic data. Other assets such as the hardware could be protected physically by limiting authorization to their storage rooms and also limit the location in which they are expected to be used at. Limiting access ensures that those that are not authorized to access the information are locked out of the database.Hence, this is an important strategy in protecting patients’ data.

The second method is through carrying out regular audits on the electronic system and the individuals handling the technological assets. Audit controls record and examine the activities that involve access and use of the patients’ data. This can be integrated into the Electronic Health Record (EHR) system or used to monitor the physical movements of the individuals that have access to the records. In addition, HIPAA requires that all health institutions that use the EHR system should run audit trails and have the necessary documentation of the same (Hoofman & Podgurski,2007). Some of the information collected during audits includes the listing of the content, duration and the user. This can be recorded in form of audit logs which makes it easy to identify any inconsistencies in the system (Dekker &Etalle ,2007). Further, monitoring of the area where the hardware have been placed for used should be done. This can achieve by use of recorded video, which monitors the activities of individuals who use the system. This can also be audited regularly and any inconsistencies noted (Ozair et al., 2005) Carrying out audits of the technology assets of the healthcare institution will help to monitor the daily use of the system which will enable the identification of any abnormal activities that may endanger patients’ data.

The third method is the setting up of policies and standards that safeguard the patients’ data. These policies may vary from one institution to another. For instance, the employees should be prohibited against sharing their passwords and ID and they should always log out their accounts after accessing the system. The authorized individuals would also be properly trained about these so that they are aware of their importance. In addition, these policies should be accompanied by consequences which will impact the users. This will ensure that they follow the policies to the letter. The set of policies and standards are to ensure uniformity in the protection of patients’ data (Ozair et al., 2005).

The fourth method that could be implemented to protect patients’ information is through the application of various security measures to the software and the hardware. The software can be protected through encryption of data, using firewalls and antivirus software’s to prevent hackers from accessing the data. Intrusion detection software can also be integrated into the system. These measures will protect the data from individuals who intend on hacking into the system online and accessing information for malicious purposes. The hardware could be protected by placing security guards at different stations where patients’ data is stored so that he ensures that no unauthorized person gets access to the area or no one tampers with the system or steals it. This step will ensure that the hardware is kept safe from intruders and people with malicious intent.

Protecting patient data starts with the software systems that house the data. The databases that warehouse patient data must be limited to only those who need access and access to each record must be logged and routinely audited at a minimum. Data should only reside where necessary. This means that data should not be stored on devices, at rest. For Apple devices, device management tools such as the Casper Suite from JAMF Software both help to keep end users from moving data out of the software that provides access patient data, and in the case of inadvertent leakage of data onto unprotected parts of devices, devices should be locked or wiped in case of the device falling outside the control of a care giver. Finally, the integrity of devices must be maintained, so jailbroken devices should not be used, and devices and software on devices should always be kept up-to-date, and strong security policies should be enforced, including automatic lock of unattended devices and strong password or pin code policies applied.

In summary, the protection of patients’ data in this technological era should be given a priority. In consideration of the frequency and losses that are experienced due to leakage or loss of private patients’ information, more should be invested in maintaining privacy and confidentiality of data. This can be achieved through controlling access to the electronic data and the gadgets that hold it, carrying out regular audits on the access of the system, creating policies and procedures that ensure that data is secures and finally through, putting in security measures that guard against loss and leakage of the information. All these measures will aid in alleviating the risk of patients’ data and maintaining their privacy and confidentiality which is the main agenda.

REFERENCES

Dekker, M. A. C., & Etalle, S. (2007). Audit-based access control for electronic health records.Electronic Notes in Theoretical Computer Science,168, 221-236.

Hoffman, S., & Podgurski, A. (2007). Securing the HIPAA security rule. Journal of Internet Law, Spring, 06-26.

Garrison, C. P., & Guy Posey, O. (2012). MEDICAL IDENTITY THEFT: CONSEQUENCES, FREQUENCY, AND THE IMPLICATION OF ELECTRONIC HEALTH RECORDS AND DATA BREACHES. International Journal of Social Health Information Management5(11).

Gajanayake, R., Iannella, R., & Sahama, T. (2014). Privacy oriented access control for electronic health records. electronic Journal of Health Informatics8(2), 15.

Ozair, F. F., Jamshed, N., Sharma, A., & Aggarwal, P. (2015). Ethical issues in electronic health records: A general overview. Perspectives in clinical research6(2), 73.

 

June 30th, 2016

Posted In: Apple Configurator, Business, iPhone, Mac OS X, Mac OS X Server, Small Business

Tags: , , , , ,

Leave a Comment

I’ve worked with a lot of organizations switching between Mobile Device Management (MDM) solutions in my career. And I’ve seen the migration projects go both really, really well, and really, really poorly. In most cases, the migration is somewhat painful no matter what you do. But in this (my first) article on the JAMF blog, I try and organize my thoughts around a few things to look out for when migrating between MDMs/MAMs, and some context/experience around those.

https://www.jamfsoftware.com/blog/10-things-to-consider-when-switching-between-mobile-device-management-solutions/

Screen Shot 2016-06-23 at 11.45.32 AM

June 23rd, 2016

Posted In: Articles and Books, iPhone, JAMF, Mac OS X

Tags: , , , , , ,

Leave a Comment

Posted a Huffington Post article from my notes from the WWDC keynote. Hope you enjoy!

Apple kicked off WWDC (World Wide Developers Conference) today, with a Keynote that showcased some of the upper tier of talent and management within Apple. As a former WWDC speaker, I watch the keynote and most sessions through the remainder of the week religiously. Here, you see what’s coming in the fall releases of the four operating systems: macOS, watchOS, iOS, and tvOS (for Macs, Apple Watches, iPhones and iPads, and Apple TVs respectively).

Screen Shot 2016-06-14 at 2.01.07 PM

PS: macOS autocorrects to tacos. Mmmmm, tacos…

June 14th, 2016

Posted In: Apple TV, Apple Watch, iPhone, JAMF, Mac OS X, Mac OS X Server

Tags: , , , , , ,

Leave a Comment

Here’s a little app to sync data from a DynamoDB database to an iOS device. Includes the ability to search. Simply edit the constants file to link it to your source. Enjoy.

Screen Shot 2016-06-05 at 5.59.57 PM

June 6th, 2016

Posted In: iPhone

Tags: , , , , , , ,

Last night, I went to setup a new Nest Protect in my home, and while I was futzing with the app (yes, futzing is the technical term) I missed the question that was asked on the device about what language to use while waiting at this screen.

IMG_8200

And so my Nest Protect was speaking Spanish. Which is fine with me; but notsofine for my daughter. So, I needed to change the language. And after hunting for the setting for awhile, I thought: self, you should document this.

So to change the language on a Nest protect, open the Nest app and then tap on the icon for Protect (which will appear once you’ve associated the first Nest Protect to your account. Then tap on the Settings gear icon in the upper right corner of the screen, which allows you to configure all your Nest Protects at once. Then tap on the Protect you want to change the language on and there’s a magical setting for Spoken Language there. Tap that and select the language you wish to use. Out of the box, the device only supports English and Spanish. But once setup, you can change the language to French or Dutch. So this is also the method to unlock French and Dutch language support on the device.

Once changed, you can replicate the change to other devices by cycling through them. I also noticed the setting didn’t appear on my iPhone. I had to use an Android device to access my Protect and make the change. The setting doesn’t seem to be a part of the iOS code. But YMMV.

March 29th, 2016

Posted In: Apps, Home Automation

Tags: , , , , , ,

When I was speaking at MacADUK, I asked Tom Bridge about starting a podcast. He’s got a great voice, and I thought he’d be a great co-host. Before we were able to get to that when we got home, Adam Codega, independently of the conversation I’d had with Tom, dropped a note on Twitter to see who else might be interested in doing a Podcast. A few people responded that they’d be interested in also jumping in on a new Podcast. Over the next few weeks, decisions were made that the podcast would be hosted as a part of MacAdmins.org, the format, the hosting location, and lots of other really cool stuff. And some of us got together and recorded the first episode. And then, last night, we recorded the second episode just in time to get that into editorial before Episode 1 is released.

And soooooo, episode 1 is out! It includes Tom Bridge, Emil Kausalik, Adam Codega, and myself. We also have an interview with some of the organizers from the Penn State Mac Admins conference, which I wasn’t able to sit in on, but find just fantastic. And Tom did some of the editing. Aaron Lippincott (@dials-Mavis) did a lot of work on the mastering and deserves lots of credit there (he made everyone sound way betterer). And John Kitzmiller did a lot of work on the domain and website and DNS type of stuff, as well as helping with hosting of the podcast assets as well. And Adam’s done a lot of work on the back end linking things together, so a great team effort.

The next episode also features Pepijn Bruienne and Marcus Ransom (who I lovingly decided we should call the He-Man of the Mac Universe) and covers the latest iOS 9.3 release, as well as some information about the Classroom app. So stay tuned for that, but click below to give the episode a listen, or find on iTunes once it appears (and I’ll post a link to that once we can).

Overall, I’m really stoked to get this thing going, and that the group has built a great system for future episodes, that should be sustainable for many, many episodes. I’m also really stoked to be able to get to work with this specific group – I’m a big fan of everyone, and I look forward to many episodes to come! So follow on Twitter at @MacAdmPodcast and feel free to let us know if you’ve done something awesome and we should mention it or interview you!

Episode 1: It Begins

Screen Shot 2016-03-28 at 10.39.29 AM

March 28th, 2016

Posted In: iPhone, Mac OS X, Mac OS X Server, Mac Security, Mass Deployment, Network Infrastructure, personal

Tags: , , , , , ,

My latest Huffington Post article is up; this one on 10 Cool Things You Might Not Know You Can Do With Dropbox. A sample of the article:

You lіvе in an аgе whеn you wаnt (and ѕоmеtіmеѕ nееd) tо access іnfоrmаtіоn аt аll tіmеѕ. Thіѕ іnсludеѕ yоur оwn dаtа аnd fіlеѕ — text dосumеntѕ, рhоtоgrарhѕ, vіdеоѕ, music and mоrе. Thаt’ѕ whу ѕеrvісеѕ lіkе Drорbоx is so popular wіth thе соnnесtеd gеnеrаtіоn.

Free оf сhаrgе (wіth a раіd uрgrаdе орtіоn), Dropbox lеtѕ уоu uрlоаd уоur files tо fоldеrѕ ассеѕѕіblе аnуwhеrе thеrе’ѕ аn Intеrnеt connection. It еlіmіnаtеѕ thе hаѕѕlе of еmаіlіng уоurѕеlf attachments аnd runnіng іntо size limits. People can use Dropbox through the desktop арр, mоbіlе аррѕ оr via thе wеb.

Read more at http://www.huffingtonpost.com/charles-edge/10-cl-things-you-didnt-kn_b_9515912.html

Screen Shot 2016-03-22 at 1.29.15 PM

March 23rd, 2016

Posted In: Apps, cloud, iPhone, Mac OS X

Tags: , , , ,

iOS 9.3 is out, with lots of new, cool features. For a list of them:

With this update your iPhone, iPad and iPod touch gain improvements to Notes, News, Health, Apple Music and a new feature called Night Shift that may even help you get a better night’s sleep by shifting the colors in your display to the warmer end of the spectrum at night. New features, improvements, and bug fixes include:

Night Shift

  • When enabled, Night Shift uses your iOS device’s clock and geolocation to determine when it’s sunset in your location, then it automatically shifts the colors in your display to the warmer end of the spectrum and may even help you get a better night’s sleep.

Notes improvements

  • Protect notes that contain your most personal data with Touch ID or a passcode
  • Sort notes alphabetically, by date created, or by date edited
  • When sketching, quickly bring up a fresh canvas with a two finger swipe, or by tapping the New Sketch button
  • A new checklist button at the bottom of every note makes it easier to create lists
  • Show thumbnails instead of large images and attachments by long-pressing on any image or attachment in a note
  • Choose whether photos and videos taken within Notes are stored only in Notes, or also added to Photos
  • Long-press on an Evernote Export file to import its contents into Notes

News improvements

  • New Top Stories section in For You highlights the most important stories of the day
  • Discover something great to read in Editors’ Picks, a selection of channels and topics handpicked by our Apple News editors
  • Swipe left on stories in For You on iPhone to quickly share or save or swipe right for more options
  • Play video stories right from For You — without opening the article
  • Read stories and watch videos in landscape orientation on iPhone
  • Change the text size in articles to make reading easier

Health improvements

  • Related third-party apps for select data types such as weight, workouts and sleep are displayed in the Health app
  • Health dashboard adds support for move, exercise, and stand Activity data and goals from Apple Watch
  • Easy access to Dashboard and Medical ID using 3D Touch Quick Actions from the Home screen
  • Third-party apps now have access to Activity rings and summaries from Apple Watch through HealthKit

Apple Music improvements

  • Add songs from the Apple Music catalog to playlists without having to add them to your library
  • Watch music videos on iPad in full screen
  • See what’s playing on Beats 1 directly from the Radio tab — without having to tune in
  • Tap the name of the currently playing song in Now Playing to go to the album
  • See which songs are most popular on albums in the Apple Music catalog

Photos improvements

  • Extract the still image from a Live Photo by tapping Duplicate which will give you the option to duplicate the Live Photo, or just the still image
  • Improved download performance of full size original photos or videos stored in iCloud Photo Library
  • Share Live Photos between iOS and OS X through AirDrop and Messages

iBooks improvements

  • Adds the ability for iBooks to store your PDFs in iCloud, making them available across all of your devices
  • Adds support for downloading previously purchased audiobooks from the iBooks Store
  • Adds the ability to share your audiobook purchases with any of your family members using Family Sharing
  • New controls for reading Manga more comfortably with faster page turns and simple controls for enlarging text
  • Adds Apple Pencil support to highlight and save your favorite passages for later

Education improvements

  • Introduces a preview of Shared iPad that enables multiple students to use the same iPad at different times throughout the day
  • Adds support for signing into iCloud with Managed Apple IDs
  • Adds compatibility for the new Classroom app
  • New configuration options to control the organization of apps on the Home Screen
  • New controls to determine which apps to show or hide on the Home Screen
  • Adds support for new restrictions for iCloud Photo Library and Apple Music

CarPlay improvements

  • Apple Music members now have access to their For You and New content in CarPlay
  • New Nearby screen in Maps to quickly find Gas, Parking, Restaurants, Coffee, and other driving essentials
  • Siri speaks more concisely when reading back and composing messages in CarPlay
  • Equalized sound levels between different audio sources in CarPlay

Dolby Digital Plus

  • Adds support for playing video encoded with Dolby Digital Plus audio streams with support for multichannel output using the Apple Lightning Digital AV Adapter

Hardware keyboard improvements and fixes

  • Enables the use of arrow keys to navigate through lists in Spotlight, Mail and Safari
  • Enables the use of space bar to scroll in Mail
  • Improves performance when using the space bar to scroll in Safari
  • Adds the ability to bring up the software keyboard from the Shortcut Bar when a hardware keyboard is connected
  • Fixes an issue that could prevent unlocking an iPad using the hardware keyboard
  • Fixes an issue that caused hardware keyboards to become unresponsive in captive login pages
  • Fixes an issue that could cause the Messages input field to disappear behind the Shortcut Bar when connected to a hardware keyboard

Other improvements

  • Maps adds support for getting a highlighted view of destinations and stops for a specific transit line by tapping on it
  • Maps now displays whether there are multiple transit line options for each route suggestion
  • Wallet app adds the ability to view the app related to a card or pass in the Wallet app by tapping an icon on the card or pass
  • Apple Pay adds support for signing up for store rewards programs with Apple Pay at point of sale terminal
  • Podcasts adds support for fullscreen video playback
  • Activity app adds a new Workout tab with monthly summaries of key metrics and the ability to filter by workout type
  • Move to iOS now offers app suggestions from the App Store based on apps installed on your Android device
  • iCloud Storage adds proactive status information and in-app notifications to let you know before you run out of space
  • Two-factor authentication is now available for all iCloud accounts
  • Support for Spanish (Latin America) system language
  • Siri support for Finnish (Finland), Hebrew (Israel), and Malay (Malaysia)

Enterprise bug fixes

  • Resolves an issue that could prevent some VPP purchased apps from launching after being updated
  • Adds iCloud backup support for device-assigned VPP apps
  • Addresses an issue that could prevent certificates from installing correctly when updating configuration profiles
  • Fixes an issue for some IPSec VPN configurations that could cause the internet connection to be interrupted after a VPN session was ended
  • Fixes an issue to prevent iBooks from emailing enterprise managed PDFs from unmanaged accounts
  • Resolves an issue for some Exchange users that caused Calendar to send multiple responses to the same invitation
  • Improves reliability for devices connecting to OS X Caching Server

Accessibility bug fixes

  • Improves 3D Touch reliability with Switch Control Accessibility option
  • Fixes an issue where VoiceOver interferes with speech after dictation
  • Fixes an issue where VoiceOver users could not write a review on the App Store
  • Resolves an issue where VoiceOver becomes unresponsive when receiving a phone call with a Bluetooth headset
  • Fixes an issue where large text was unreadable in Reminders

Other bug fixes, performance and stability improvements

  • Fixes an issue where manually changing the date to May 1970 or earlier could prevent your iOS device from turning on after a restart
  • Fixes issues that could prevent some iCloud Backups from completing
  • Fixes an issue for some users where Health data was incomplete after restoring from iCloud Backup
  • Fixes an issue where an inaccurate battery percentage could be displayed
  • Addresses an issue that prevented iMessage or FaceTime activation for some users
  • Addresses an issue that could prevent displaying the Phone interface while receiving a call
  • Fixes an issue that enabled overriding restrictions applied to cellular data toggle
  • Fixes an issue that caused notification settings to appear in the Watch app for apps that were not installed on Apple Watch
  • Improves reliability when using 3D Touch on the keyboard
  • Improves stability of the Phone app when setting up voicemail
  • Improves stability of the Mail app when your device is low on storage
  • Improves stability in Mail while using Mail Drop to send large attachments

Some features may not be available for all countries or all areas, for more information visit: http://www.apple.com/ios/feature-availability and http://www.apple.com/ios/updates/

For information on the security content of this update, please visit this website:

http://support.apple.com/kb/HT1222

Sent from my iPhone

March 21st, 2016

Posted In: iPhone, Mac OS X Server, Mac Security, Mass Deployment

Tags: , ,

Posted a new swift command line tool to accept serial number data from an Apple device and respond with warranty information about a device at https://github.com/krypted/swiftwarrantylookup. This is based on pyMacWarranty, at https://github.com/pudquick/pyMacWarranty.

Screen Shot 2016-03-15 at 10.34.41 PM

March 16th, 2016

Posted In: Mac OS X, Mac OS X Server, Mac Security, Mass Deployment, Swift

Tags: , , , , , , , , ,

Thanks to Josh for pointing this out. Apple has a page that lets you look up whether your device has Activation Lock enabled. This way, even if you don’t have it, you can confirm that it’s locked after you, for example, remotely wipe it. The page is available at https://www.icloud.com/activationlock/.

Screen Shot 2016-03-09 at 2.28.44 PM

March 12th, 2016

Posted In: iPhone

Tags: , , , ,

Next Page »