Detecting phishing emails can be very difficult as attackers find more and more creative ways to conceal them. What is phishing? Phishing is when an attacker sends an email that… Read more »
HIPAA Security Rule requires that all software be updated and current. If the software is no longer supported by the vendor, it is not HIPAA compliant. [DISPLAY_ULTIMATE_SOCIAL_ICONS]
Most businesses today have a website. A website is a useful tool to educate prospective customers about your services and help to make contact with them. Websites allow your business… Read more »
[DISPLAY_ULTIMATE_SOCIAL_ICONS]
[DISPLAY_ULTIMATE_SOCIAL_ICONS]
HIPAA is mostly concerned with patient privacy. This is to protect who does what with their data. one of the parts of this is controlling who accesses your ePHI. One… Read more »
When people think of identity theft, they usually think of their personal credit being used to open new credit or loan accounts. But there is another type of identity theft… Read more »
Password security is a cornerstone to most of the security systems we use to protect our data. Whether its pin codes of debit cards, passwords for social media sites, or… Read more »
Phishing attacks may be the most threatening to healthcare entities as well as companies in the United States. According to some estimates, phishing attacks increased 59% in 2017 alone. Most… Read more »
We often hear that if an office uses a cloud based EMR (rather than having a server in the office), that they don’t need to worry about HIPAA anymore. The… Read more »