Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


07:38 AM

BEW Offers Solutions

BEW Global implemented solutions to address HIPAA compliance concerns within The Portland Clinic and Longmont United Hospital

DENVER, Co. -- BEW Global, an Information Asset Protection and Network Security solution provider, today announced that it has implemented security solutions to address HIPAA compliance concerns within The Portland Clinic and Longmont United Hospital.

The Health Insurance Portability and Accountability Act (HIPAA) requires healthcare providers to keep private and secure Protected Health Information (PHI) and outlines

specific procedures and best practices for accomplishing this privacy. More and more of the information exchanged today within healthcare organizations is in the form of electronic communications, including emails, web mail, instant messaging, blogs and message boards. Two healthcare organizations – Longmont United Hospital and The Portland Clinic – recently took proactive measures by working with BEW Global to ensure sensitive and confidential information is not exposed through the course of daily business email communications.

“One area of concern for healthcare organizations is making sure unsecured PHI is not coming or going via various types of electronic communications,” said Robert Eggebrecht,

Senior Partner of BEW Global. “We go into these healthcare organizations and perform Network Penetration tests and Exposure Assessments. Organizations like Longmont United and

The Portland Clinic want to be proactive about being able to identify even the smallest amount of unprotected PHI coming into or leaving the organizations. We can recommend and

implement the right solution to not only alert administrators to the problem, but to proactively and automatically secure the information found in the emails.”

BEW Global

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-13
A UXSS was discovered in the Thanos-Soft Cheetah Browser in Android 1.2.0 due to the inadequate filter of the intent scheme. This resulted in Cross-site scripting on the cheetah browser in any website.
PUBLISHED: 2021-04-13
The Motorola MH702x devices, prior to version, do not properly verify the server certificate during communication with the support server which could lead to the communication channel being accessible by an attacker.
PUBLISHED: 2021-04-13
A privilege escalation vulnerability in Lenovo Power Management Driver for Windows 10, prior to version, that could allow unauthorized access to the driver's device object.
PUBLISHED: 2021-04-13
A null pointer dereference vulnerability in Lenovo Power Management Driver for Windows 10, prior to version, that could cause systems to experience a blue screen error.
PUBLISHED: 2021-04-13
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.