• Home
  • About Us
  • Contact Us
  • Home
  • About Us
  • Contact Us
Your HIPAA Guide
Skip to content
  • Home
  • About Us
  • Contact Us

Who needs a Business Associate Agreement?

If you are in any way involved with HIPAA, then you have likely heard of a Business Associate Agreement. Covered Entities know they need them but maybe not when they… Read more »

HIPAA Compliance   

Case Study – Unsupported Software Violates HIPAA Compliance Requirements – Costs Practice $150,000

For most small practices, the HIPAA compliance requirements can seem very confusing. Sometimes they may not even make sense. One of these is the requirement that all software used by… Read more »

Case Studies   

Windows 7 HIPAA Compliance

The HIPAA Security Rule (45 C.F.R. § 164.308 (a)(5)(ii)(B) requires that all software used by Covered Entities and Business Associates be kept current and up to date with updates from… Read more »

HIPAA Compliance, Network Security   

You will need a better plan than that for your security

Medical practices need plans for protecting the PHI that they have. A keep sign won’t be enough… [DISPLAY_ULTIMATE_SOCIAL_ICONS]

Cartoons   

Do you have a backup and disaster recovery plan? Are you sure?

One of the most important parts of cybersecurity is actually having a backup and disaster recovery plan in place. This is often the area that many practices overlook because it… Read more »

BDR   
phishing email attack, phishing emails

Case Study – Phishing email causes breach of 23,000 patients

A phishing email caused a breach at a Colorado-based practice that resulted in the unauthorized release of the protected health information (PHI) of 23,000 patients. Using a phishing email to… Read more »

HIPAA Compliance, Phishing   

Throwing away medical records? Could be an expensive mistake.

Many sites have been fined for throwing away records in an improper way. [DISPLAY_ULTIMATE_SOCIAL_ICONS]

Cartoons   
password manager

Best password manager for most users – LastPass

In the past, most people only needed to remember a couple of passwords and PIN numbers in their daily lives. However, as we use more and more online services such… Read more »

Network Security   

Case Study – Not Having a HIPAA compliant website costs practice $25,000

Sometimes it easy to forget just how expansive HIPAA regulations really are. Often we think it’s limited to paper records or electronic medical records (EMR). However, HIPAA covers all places… Read more »

Case Studies, HIPAA Compliance   

Is your password secure? Are you sure?

How strong and secure is your password? If it’s on the top 100 list of most common passwords, then yours isn’t strong enough to protect you. [DISPLAY_ULTIMATE_SOCIAL_ICONS]

Cartoons   
« Previous 1 … 9 10 11 12 13 14 Next »

Recent Posts

  • Phishing Attacks: AI Used in Virtual Meeting to Steal Millions
  • Vendor Breaches: The Risk to Your HIPAA Compliance
  • IoT Security: We Don’t Need to Connect EVERYTHING to the Web
  • Phishing Emails: Lock Down Your Email to Prevent Breaches
  • Secure Mobile Devices Against Hackers and HIPAA Breaches

Categories

  • BDR
  • Business Associates
  • Cartoons
  • Case Studies
  • Computer Security
  • Display
  • HIPAA Compliance
  • HIPAA Training
  • HIPAA Violations
  • Identity Theft
  • IT Services
  • Network Security
  • Phishing
  • Quick Wins
  • Ransomware
  • Risk Assessment

Copyright © 2023 Iron Comet Consulting, Inc.
>

.

. .

.

Thank you for submitting form..!