Healthcare
View Article
HIPAA Security Rule – Administrative Safeguards31 August 2017
The Department of Health and Human Services Office of Civil Rights (OCR) has investigated and resolved over 158,000 Health Insurance Portability and Accountability Act (HIPAA) cases since 2003. The top two HIPAA Security Rule (HSR) compliance issues their investigations have identified are impermissible uses and disclosures of protected health information and a lack of safeguards of protected health information. The most common types of covered entities that have had […]
Learn More
View Article
Phase 2 HIPAA Audits10 May 2017
Phase 2 Audits for the Health Insurance Portability and Accountability Act (HIPAA) are currently underway and medical practices should be aware that the Office of Civil Rights (OCR) is targeting an increasingly broad range of covered entities and business associates. This comprehensive approach is likely to continue when they begin Phase 3 Audits. HIPAA is […]
Learn More
View Article
HIPAA Security Rule Risk Assessment Overview10 January 2017
The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996 and celebrated its 20th anniversary in 2016. The Final Rule on Security Standards (“HIPAA Security Rule”) was enacted in 2003 and covered entities (CE) were expected to be compliant by 2005. Despite the fact that the HIPAA Security Rule (HSR) has been a […]
Learn More
View Article
Top Misconceptions of Cyber Assessments14 December 2016
One of the biggest challenges of strengthening your organization’s network security is understanding where to begin. Security vendors are constantly pushing new hardware and software on organizations to solve their problems, but there is no “one solution” to cyber security. A cyber security risk assessment helps organizations identify their unique areas of weakness so they […]
Learn More
View Article
Electronic Mail Security: A Letter from One IT Executive to Another03 August 2016
From presidential nominees to Fortune 500 companies, communicating via email is a critical component of every organization. Is your communication secure?
Learn More
View Article
What to Consider When Selecting a Cyber Security Firm06 July 2016
Several factors must be considered when evaluating a partnership with a cyber security firm. Don’t sign a contract before you ask these questions.
Learn More