HIPAA Compliance 101
To become HIPAA compliant, your business will need to implement a number of physical, technical, and administrative safeguards to protect the confidentiality, integrity, and availability of protected health information (PHI).
This author has yet to write their bio.
Meanwhile lets just say that we are proud admin contributed a whooping 160 entries.
To become HIPAA compliant, your business will need to implement a number of physical, technical, and administrative safeguards to protect the confidentiality, integrity, and availability of protected health information (PHI).
Not all cookies are created equally. As a self-professed chocolate cookie aficionado, I can personally attest to this. But last week, the Department of Health and Services alerted us that cookies may also be bad for our health … information.
Well, this is a little embarrassing… Last week one of our promoted products, password manager LastPass, announced they had suffered a breach through a third-party cloud storage solution. They disclosed an unknown actor gained access to certain customer information, but they didn’t elaborate. They did emphasize that no customer passwords were exposed since those are […]
Three cyber weaknesses you can prevent. The list of computer vulnerabilities is growing rapidly right now. While this is an ongoing trend, the pace has picked up of late. Some may blame Russia, but in truth, they’re just one part of the problem. The reality is the bulk of attacks are for financial gain, and […]
Unsecure Devices Most of you likely know that printers, scanners, and multifunction devices have been a weak link for cybersecurity for many network administrators. There are several reasons for this. First, like many networked medical devices, there was no built-in process for software updates, so when a security vulnerability was identified, few devices received patches. […]
Are You Tired of Hearing It? Just SHUT UP ALREADY – I know some of you are thinking that. We’ve been going on and on about the importance of cybersecurity training, and I know more than a few of you are getting tired of it. So what do we do about that? We DOUBLE down! […]
Beyond Training – You Can’t Stop There. We’ve talked a lot about training lately because it is the single best tool you have to keep your network secure. However, it’s not bulletproof. Two weeks ago Microsoft issued patches for over 85 security weaknesses across all of their Windows operating systems, including patches to close known […]
Three Steps You MUST Take Now. Cybersecurity professionals are sounding the alarm in agreement that we are about to experience another uptick in cybersecurity attacks. They cite numerous reasons for this coming storm. The most significant concern is the increased tensions we have with the usual cast of cyber-attacking state actors – Russia, China, North […]
At a recent discussion in Texas on cybersecurity in healthcare, technology experts were in agreement that cyber threats were increasing and getting more sophisticated. When we consider the options, we can boil them down to two – tighter network lockdowns, and more training.
Are You Prepared? Here comes Ian, expecting to hit Florida soon. Use this as a wake-up call to review your own emergency preparedness. Many of you have recently experienced natural disasters. Be it hurricanes, floods, earthquakes, or fires, being prepared counts when it matters most. Those of us in the healthcare profession have more to […]
Old age and cybersecurity We all know many things don’t work as well as they(we) age. It’s a fact of life most of us face. While age impacts us personally, the systems around us are also impacted by age. A recent study by cybersecurity firm Coalfire discovered that our older business equipment poses one of […]
The Importance of Patching Most of us know about patch Tuesday – the second Tuesday of every month is when Microsoft releases its software patches. Most IT companies either manually update client systems or have them set to run automatically. Like most software companies, we’re accustomed to regular patch releases to help keep our systems […]
EHR & HIPAA A recent report published by Cynergistek presented data showing less than half of the nation’s healthcare institutions comply with the National Institute of Standards and Technologies (NIST) Cybersecurity Framework (CSF). The CSF is a best-practices roadmap for healthcare organizations to align their technologies with both HIPAA and cybersecurity conformity. But digging into the numbers […]
EULA, YOU, and HIPAA What do End User License Agreements and HIPAA have to do with each other? According to recent discoveries, a heck of a lot. It turns out apps like Meta’s Facebook and Messenger, Instagram, Tik Tok, and others, are mining your data and activity on an unprecedented scale. Here’s what we know. […]
New HIPAA Guidance Years ago, at a HIPAA conference in DC hosted by NIST, they announced an update to 800-66 would be coming. Almost 10 years later, we now have a draft copy of this paper – 800-66r1. Why is this significant? 800-66 was the most significant guidance the government ever issued on how to […]