How Protected Health Information hides in your network, and how to stop it.
One of the primary goals of a HIPAA compliance Risk Assessment is to document where PHI is stored for your organization.
The Power of HIPAA Training: Data Security & Compliance
Uncover the importance of HIPAA training: safeguard data, ensure compliance, and strengthen data security in healthcare organizations.
Addressing Email Vulnerabilities with HICP
In today's interconnected world, email has become an indispensable tool for communication in various industries, including healthcare. However, the healthcare sector faces unique challenges when it comes to protecting sensitive
Are you getting good cybersecurity guidance?
The cybersecurity skills gap exists across all industries, and healthcare is no exception. It is a significant and persistent challenge, and its implications can have far-reaching consequences. Here are some of the factors causing the shortage:
How will AI impact healthcare?
For most of us, ChatGPT is little more than a novelty, kind of like the first iteration of the internet many years ago. As an example, here’s what ChatGPT has to say about the current state of cybersecurity in healthcare.
Protecting Patients: Understanding the Biggest Cyber Threats
The healthcare industry is at the forefront of technological advancements, with electronic health records (EHRs) and telemedicine being just a couple of examples of how technology has revolutionized patient care.
HIPAA Compliance 101
To become HIPAA compliant, your business will need to implement a number of physical, technical, and administrative safeguards to protect the confidentiality, integrity, and availability of protected health information (PHI).
HHS warns cookies can be bad for your health information
Not all cookies are created equally. As a self-professed chocolate cookie aficionado, I can personally attest to this. But last week, the Department of Health and Services alerted us that cookies may also be bad for our health ... information.
A bit of egg on my face.
Well, this is a little embarrassing...
Last week one of our promoted products, password manager LastPass, announced they had suffered a breach through a third-party cloud storage solution. They disclosed an unknown actor gained access to certain…
The hole in your cybersecurity you may be overlooking
Unsecure Devices
Most of you likely know that printers, scanners, and multifunction devices have been a weak link for cybersecurity for many network administrators. There are several reasons for this.
First, like many networked medical devices,…
OCR Training Video
Are You Tired of Hearing It?
Just SHUT UP ALREADY - I know some of you are thinking that. We've been going on and on about the importance of cybersecurity training, and I know more than a few of you are getting tired of it. So what do we do…
When cybersecurity training isn’t enough – what next?
Beyond Training - You Can't Stop There.
We've talked a lot about training lately because it is the single best tool you have to keep your network secure. However, it's not bulletproof.
Two weeks ago Microsoft issued patches for over 85 security…
Three ways to improve your cybersecurity
Three Steps You MUST Take Now.
Cybersecurity professionals are sounding the alarm in agreement that we are about to experience another uptick in cybersecurity attacks. They cite numerous reasons for this coming storm. The most significant concern…
Week 2 of Cyber awareness month!
At a recent discussion in Texas on cybersecurity in healthcare, technology experts were in agreement that cyber threats were increasing and getting more sophisticated. When we consider the options, we can boil them down to two - tighter network lockdowns, and more training.
Emergency Preparedness – Are you ready
Are You Prepared?
Here comes Ian, expecting to hit Florida soon. Use this as a wake-up call to review your own emergency preparedness.
Many of you have recently experienced natural disasters. Be it hurricanes, floods, earthquakes, or fires,…
Cybersecurity and old age – they don’t mix
Old age and cybersecurity
We all know many things don't work as well as they(we) age. It's a fact of life most of us face. While age impacts us personally, the systems around us are also impacted by age. A recent study by cybersecurity firm…