{"id":977,"date":"2012-05-25T18:01:42","date_gmt":"2012-05-25T23:01:42","guid":{"rendered":"http:\/\/swildow.darktech.org\/wp\/?page_id=977"},"modified":"2020-12-22T11:52:11","modified_gmt":"2020-12-22T16:52:11","slug":"ehr-info","status":"publish","type":"page","link":"http:\/\/www.wildow.com\/blog\/?page_id=977","title":{"rendered":"Security info"},"content":{"rendered":"<p>Security basics<\/p>\n<ol>\n<li><a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2016\/NIST.IR.7621r1.pdf\">Small Business Information Security: The Fundamentals<\/a><\/li>\n<li><a href=\"http:\/\/www.sans.org\/security-resources\/policies\/\" target=\"_blank\" rel=\"noopener\">Sans Security Policy Templates<\/a><\/li>\n<li><a href=\"https:\/\/www.sans.org\/security-resources\/policies\/general#acceptable-use-policy\">Sans Information Security Policy Templates<\/a><\/li>\n<\/ol>\n<p>RansomWare<\/p>\n<ol>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/tips\/ST19-001\">Cybersecurity &amp; Infrastructure Security Agency Security Tip (ST-19-001)\u00a0 Protecting against ransomware<\/a><\/li>\n<\/ol>\n<p>HIPAA info<\/p>\n<ol>\n<li><a href=\"http:\/\/healthit.hhs.gov\/portal\/server.pt?open=512&amp;objID=1173&amp;parentname=CommunityPage&amp;parentid=3&amp;mode=2&amp;in_hi_userid=10741&amp;cached=true\" target=\"_blank\" rel=\"noopener\">The Health IT Privacy and Security Toolkit<\/a><\/li>\n<li><a href=\"http:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/administrative\/securityrule\/radraftguidance.pdf\" target=\"_blank\" rel=\"noopener\">Guide to Privacy and Security of Health Information<\/a><\/li>\n<li><a href=\"http:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/administrative\/securityrule\/securityruleguidance.html\" target=\"_blank\" rel=\"noopener\">http:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/administrative\/securityrule\/securityruleguidance.html\u00a0<\/a><\/li>\n<li><a href=\"http:\/\/www.ndsu.edu\/fileadmin\/generalcounsel\/HIPAAPublications\/HIPAA_Security_Procedures_Resource_Manual_9-10.pdf\" target=\"_blank\" rel=\"noopener\">Sample hipaa<\/a><\/li>\n<\/ol>\n<p>Malware info<\/p>\n<ol>\n<li>Interactive online Malware Analysis <a href=\"https:\/\/app.any.run\">https:\/\/app.any.run<\/a><\/li>\n<li>Mitre Attack tactics and technique\u00a0 <a href=\"https:\/\/attack.mitre.org\/matrices\/enterprise\/\">https:\/\/attack.mitre.org\/matrices\/enterprise\/<\/a><\/li>\n<li>Reverse engineer tool\u00a0 <a href=\"https:\/\/ghidra-sre.org\/\">https:\/\/ghidra-sre.org\/<\/a><\/li>\n<li>Mimikatz\u00a0\u00a0 <a href=\"https:\/\/www.offensive-security.com\/metasploit-unleashed\/Mimikatz\/\">https:\/\/www.offensive-security.com\/metasploit-unleashed\/Mimikatz\/<\/a><\/li>\n<\/ol>\n<p>Sites with security info<\/p>\n<ol>\n<li><a href=\"https:\/\/www.offensive-security.com\/\">https:\/\/www.offensive-security.com\/<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Security basics Small Business Information Security: The Fundamentals Sans Security Policy Templates Sans Information Security Policy Templates RansomWare Cybersecurity &amp; Infrastructure Security Agency Security Tip (ST-19-001)\u00a0 Protecting against ransomware HIPAA info The Health IT Privacy and Security Toolkit Guide to &#8230; <a class=\"more-link\" href=\"http:\/\/www.wildow.com\/blog\/?page_id=977\">Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":5,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/pages\/977"}],"collection":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=977"}],"version-history":[{"count":15,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/pages\/977\/revisions"}],"predecessor-version":[{"id":2187,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/pages\/977\/revisions\/2187"}],"wp:attachment":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}