Entries by

, ,

HIPAA Compliance 101

To become HIPAA compliant, your business will need to implement a number of physical, technical, and administrative safeguards to protect the confidentiality, integrity, and availability of protected health information (PHI).

, , , ,

A bit of egg on my face.

Well, this is a little embarrassing… Last week one of our promoted products, password manager LastPass, announced they had suffered a breach through a third-party cloud storage solution. They disclosed an unknown actor gained access to certain customer information, but they didn’t elaborate. They did emphasize that no customer passwords were exposed since those are […]

, , , ,

The hole in your cybersecurity you may be overlooking

Unsecure Devices Most of you likely know that printers, scanners, and multifunction devices have been a weak link for cybersecurity for many network administrators. There are several reasons for this. First, like many networked medical devices, there was no built-in process for software updates, so when a security vulnerability was identified, few devices received patches. […]

, , , , ,

When cybersecurity training isn’t enough – what next?

Beyond Training – You Can’t Stop There. We’ve talked a lot about training lately because it is the single best tool you have to keep your network secure. However, it’s not bulletproof. Two weeks ago Microsoft issued patches for over 85 security weaknesses across all of their Windows operating systems, including patches to close known […]

, , , , ,

Three ways to improve your cybersecurity

Three Steps You MUST Take Now. Cybersecurity professionals are sounding the alarm in agreement that we are about to experience another uptick in cybersecurity attacks. They cite numerous reasons for this coming storm. The most significant concern is the increased tensions we have with the usual cast of cyber-attacking state actors – Russia, China, North […]

, , , , Week 2 of Cyber awareness month!

At a recent discussion in Texas on cybersecurity in healthcare, technology experts were in agreement that cyber threats were increasing and getting more sophisticated. When we consider the options, we can boil them down to two – tighter network lockdowns, and more training.

, , , , Emergency Preparedness – Are you ready

Are You Prepared? Here comes Ian, expecting to hit Florida soon. Use this as a wake-up call to review your own emergency preparedness. Many of you have recently experienced natural disasters. Be it hurricanes, floods, earthquakes, or fires, being prepared counts when it matters most. Those of us in the healthcare profession have more to […]

, , , , Cybersecurity and old age – they don’t mix

Old age and cybersecurity We all know many things don’t work as well as they(we) age. It’s a fact of life most of us face. While age impacts us personally, the systems around us are also impacted by age. A recent study by cybersecurity firm Coalfire discovered that our older business equipment poses one of […]

, , , , Are you vulnerability to these attacks?

The Importance of Patching Most of us know about patch Tuesday – the second Tuesday of every month is when Microsoft releases its software patches. Most IT companies either manually update client systems or have them set to run automatically. Like most software companies, we’re accustomed to regular patch releases to help keep our systems […]

, , , , Your EHR is failing you for HIPAA compliance

EHR & HIPAA A recent report published by Cynergistek presented data showing less than half of the nation’s healthcare institutions comply with the National Institute of Standards and Technologies (NIST) Cybersecurity Framework (CSF). The CSF is a best-practices roadmap for healthcare organizations to align their technologies with both HIPAA and cybersecurity conformity. But digging into the numbers […]

, , , , Your apps are your security enemy. Here’s what we’ve recently discovered.

EULA, YOU, and HIPAA What do End User License Agreements and HIPAA have to do with each other? According to recent discoveries, a heck of a lot. It turns out apps like Meta’s Facebook and Messenger, Instagram, Tik Tok, and others, are mining your data and activity on an unprecedented scale. Here’s what we know. […]