Trillium Insights

Thoughts and Insights from Trillium's Practice Leaders

Am I Secure, Where Do I Start?

Am I Secure, Where Do I Start?

If your business is responsible for maintain the privacy of Protected Health Information (PHI,) you are inevitably familiar with Health Insurance Portability and Accountability (HIPAA) data security regulations.  HIPAA governs the sharing of such information, both for electronic and paper rec... Continue reading…

What does building Security into your development lifecycle mean?

What does building Security into your development lifecycle mean?

Part of the system development lifecycle includes the relationship between development teams and operations teams.  DevOps is shorthand for development and operations – a software development phase originally used in Agile methodology that enables systems to be more rapidly deployed and... Continue reading…

What Caused the Cybersecurity Breach?

What Caused the Cybersecurity Breach?

Over the last 12 months, we have all read news stories about cybersecurity breaches that have occurred at very well-known organizations.  The stories tend to focus on the number of people that are potentially impacted by the breach – a good piece of information to know.  Many of th... Continue reading…

HIPAA Compliance is way bigger than IT

HIPAA Compliance is way bigger than IT

We recently completed another Security Assessment and remediation plan development for a client that maintains HIPAA data.  In this instance, the organization’s maturity was relatively low in areas of data access rights and controls around data access.  For this client, there was a... Continue reading…