Tag Archive for: HIPAA

PHI Personal Health Information
, , ,

How Protected Health Information hides in your network, and how to stop it.

One of the primary goals of a HIPAA compliance Risk Assessment is to document where PHI is stored for your organization.
, , ,

The Power of HIPAA Training: Data Security & Compliance

Uncover the importance of HIPAA training: safeguard data, ensure compliance, and strengthen data security in healthcare organizations.
Requirements for HIPAA compliance
, ,

Latest News in HIPAA Compliance

The Health Insurance Portability and Accountability Act (HIPAA) is a set of federal regulations that protect the privacy and security of health information.
Cybersecurity Training Online
, , , , ,

When cybersecurity training isn’t enough – what next?

Beyond Training - You Can't Stop There. We've talked a lot about training lately because it is the single best tool you have to keep your network secure. However, it's not bulletproof. Two weeks ago Microsoft issued patches for over 85 security…
, , , ,

Week 2 of Cyber awareness month!

At a recent discussion in Texas on cybersecurity in healthcare, technology experts were in agreement that cyber threats were increasing and getting more sophisticated. When we consider the options, we can boil them down to two - tighter network lockdowns, and more training.
, , , ,

Emergency Preparedness – Are you ready

Are You Prepared? Here comes Ian, expecting to hit Florida soon. Use this as a wake-up call to review your own emergency preparedness. Many of you have recently experienced natural disasters. Be it hurricanes, floods, earthquakes, or fires,…
HP missing updates
, , , ,

Are you vulnerability to these attacks?

The Importance of Patching Most of us know about patch Tuesday - the second Tuesday of every month is when Microsoft releases its software patches. Most IT companies either manually update client systems or have them set to run automatically.…
EHR failing HIPAA compliance
, , , ,

Your EHR is failing you for HIPAA compliance

EHR & HIPAA A recent report published by Cynergistek presented data showing less than half of the nation's healthcare institutions comply with the National Institute of Standards and Technologies (NIST) Cybersecurity Framework (CSF).…
Social media app infringment
, , , ,

Your apps are your security enemy. Here’s what we’ve recently discovered.

EULA, YOU, and HIPAA What do End User License Agreements and HIPAA have to do with each other? According to recent discoveries, a heck of a lot. It turns out apps like Meta's Facebook and Messenger, Instagram, Tik Tok, and others, are mining…
NIST Cybersecurity
, , , ,

New HIPAA guidance is on the way, here’s the good and the bad.

New HIPAA Guidance Years ago, at a HIPAA conference in DC hosted by NIST, they announced an update to 800-66 would be coming. Almost 10 years later, we now have a draft copy of this paper - 800-66r1. Why is this significant? 800-66 was the…
, , , , ,

OCR announces 11 more HIPAA ROA violations

Eleven more fines, are you next? OCR recently announced that 11 more entities were fined for failing to provide timely access to patient records following a patient complaint. This list included mental health practitioners, dentists, and more.…
, , , ,

HIPAA and your password policy – are you compliant?

HIPAA and your password. Thanks to NIST, who in 2017 changed their recommended password policy in publication 800-63B, the change/do not change debate has been ongoing. If you aren't familiar with the publication, here's a short news video…
MCG databreach healthcare
, , , ,

The lawsuits are flowing in the MCG Health breach. Here’s why it’s bad for you.

Vendor Risk MCG Health is a health information services company providing clinical guidelines to hospitals and other care facilities nationwide. They recently reported a breach that had occurred back in 2020, and already lawsuits from their…
HIPAA Breach Notification

HIPAA Breaches Running at Record Rate

HIPAA Breaches and You In the past 12 months, we've averaged over 3.3 million breached healthcare records per month. Aside from the breach of confidentiality this represents, the information in those records is used for financial fraud,…
Strong password

Hey, what’s your password? The Dark Web knows

Creating Better Passwords To make passwords "strong," they must be both unique and lengthy (at least 12 characters). Generally, people are pretty bad at creating passwords that fit either category (much less both). You could let a computer…
HIPAA violations
, , ,

HIPAA Fines Show How You Are Failing

HIPAA violations are on the rise. Although we didn't hear too much about breach-related HIPAA violations during the pandemic, incidents were occurring, and the violations are now being pursued and published. The result is a steady stream of…