HIPAA regulations are often difficult for small practices to understand. The rules are written so say that Covered Entities and Business Associates must do what is reasonable and appropriate to… Read more »
The SamSam ransomware is making the rounds. The US Department of Homeland Security and the Federal Bureau of Investigation have released an alert through the US Computer Emergency Readiness Team… Read more »
A Business Associate Agreement (BAA) is one of the core items contained within HIPAA regulations. If a Covered Entity doesn’t have them in place with their outside vendors, then they… Read more »
Covered Entities and Business Associates must perform a yearly Risk Assessment under HIPAA law according to §164.308, the Security Rule. It was first added in 2003 in the Privacy Rule… Read more »
Passwords. We use them in so many areas of our lives and we all hate them. Passwords for our banking sites, for social media, our phones, and our computers. Passwords… Read more »
Does your office use a consumer router from one of the following vendors as its access to the Internet? D-Link TP-Link Netgear Linksys Asus AVM Belkin Cerio TrendNet Zyxel
In this week’s case study we will be discussing firewalls and why they are important. HIPAA requires that Covered Entities and Business Associates have reasonable and appropriate network security to… Read more »
Sometimes talking a selfie at the office can be expensive! It we aren’t careful, it can result in a HIPAA violation. This actually happened at one of our sites. An… Read more »
One of the biggest external threats to a practice’s Protected Health Information (PHI) is phishing. This can be seen in many breaches that are reported to the Department Of Health… Read more »
Losing a laptop or tablet is bad enough, but what about when it has Protected Health Information (PHI) on it? That turns a bad day into a disaster. Mobile devices… Read more »