The measures needed to protect data held by Canadian hospitals

A new direction in data protection, the IT fallout of the VW scandal, and post-TIFF movies that network admins just have to see

Share this article:

The cure for hospital insider threats

One of the most publicized Canadian hospital data breaches occurred in 2013 at the Toronto-area Rouge Valley Health Systems where a clerk used data from the hospital’s electronic patient system to peddle education savings plans to new mothers. Last year another clerk from the same medical institution was found to be selling patients’ data to a firm that sold RESPs.

Since then Rouge Valley has been ordered audit all instances where staff access personal health information as well as revise its privacy training tools and materials for staff.

At Toronto’s Sunnybrook Health Science’s hospital, Jeff Curtis, the hospital’s chief privacy officer, has mandated new data controls that include random audits as well as mandatory privacy impact and security threat assessment reviews of more than 100 IT systems that deal with personal patient data.

Curtis’ tip to other hospital privacy and security officers: Watch the gift shop. It’s the one place in the building that handle’s credit cards.

How Volkswagen emissions software fiasco is impacting the IT industry

Executives are resigning and company shares have sunk by the billions and Volkswagen’s veritable image as a maker of peppy, fun and clean cars has taken a decisive hit.

However, the fallout from VW’s use of software which falsified emission readings from cars it sold in North America has also impacted another party.

In her report for, information systems professional Donna Lindskog argues that because of the German automaker’s indiscretion, the reputation of IT professionals are being tarnished as well at a time when consumers are just beginning to trust automotive technology such as software that allow cars to park themselves.

In order to regain public trust, technology builders, she said, should make sure that it is always clear to the public “what software does and does not do.”

Is Apple’s walled garden in need of repair?

Last month, a malicious code injected into a counterfeit version of Xcode, Apple’s app development toolset, infected hundreds of application built by Chinese developers. The company’s App Store was also a victim to malicious apps five times prior to the incident, according to cyber security firm Palo Alto Networks.

Bill Anderson, chief products officer of mobile malware security company Optio Labs says he is surprised that more occurrences of malware attacks on Apple devices have not surfaced.

Are cracks beginning to appear on the much touted Apple walled garden?

Finally, a decent smartwatch that doesn’t need your phone

Without being tethered to a smartphone, most smartwatches are not really that wonderful. Sure, Samsung’s Galaxy Gear S and Ironman GPS+ from Timex have built-in cellular radios but they leave much to be desired by way of style, according to

Enter the LG Watch Urbane 2nd Edition. It comes with its own built-in radio that connects to LTE and 3G networks. When you need it to, the watch can connect to your phone via Bluetooth and Wi-Fi. And, this is the only smartwatch so far that truly looks like a fashionable timepiece.

Best of expert IP

5 must-see TIFF movies for network admins

With the star-gawking frenzy of the Toronto International Film Festival behind us, now is the perfect time to seat back and watch the latest TIFF flicks without having to wade through the crowds and pay for overpriced tickets.

expertIP’s Vawn Himmelsbach has rounded up five TIFF movies steeped in math, science, technology (and yes some intrigue, drama, adventure and all that) that will delight many tech professionals.

Checkout Vawn’s blog for what to expect from her picks which include: The Man Who Knew Infinity; Eye in the Sky; The Martian; 11 Minutes; and Return of the Atom

The upgrade network admins always neglect

Email and phone systems might come to mind when you think of neglected upgrade tasks, however, there’s another vital upgrade that network admins tend to put in the back burner up to the last minute.

It seems it’s only when network admins are really frustrated and ready to quit their jobs do they ever think of updating their resumes. And that’s a bad thing career wise, says Shane Schick.

However, help is available. Shane has unearthed a video that provides templates and career guides aimed at helping professionals fine-tune their CVs.

TD’s latest mobile banking move

Imagine a mobile banking app that not only provides helpful retirement investment advice but also suggests where you can go for dinner and even sends you special offers such as stadium seat upgrades based on your location and the financial services you have purchased.

This is something that TD Bank aims to provide its customers with its recent collaboration with Flybits, a Toronto-based startup that specializes in context-as-a-service solutions.

Flybit’s cloud-based platform allows companies to offer personalized services to their customers based on multiple contextual information such as location, user profile, user behavior, and preferences, and environmental data, just to name a few.

WebRTC, UCC and the future of SIP trunking

A recent study indicates that links between unified communications and collaboration (UCC), session initiation protocol (SIP) and Web with real-time communication (WebRTC) may be stronger than what some people think.

In a survey of 191 IT professionals, Webtorials found that 89 % of the respondents see SIP and WebRTC as complementary. SIP is also fast becoming the go-to underlying technology for all kinds of UCC solutions.

The findings suggest that UCC, SIP and WebRTC are the new tech trio of choice as researchers found that business that have deployed SIP and UCC are more likely to use WebRTC than other applications.

  1. ITWorldCanada
  2. Networkworld
Share this article:
Comments are closed.