• Home
  • About Us
  • Contact Us
  • Home
  • About Us
  • Contact Us
Your HIPAA Guide
Skip to content
  • Home
  • About Us
  • Contact Us
phishing email attack, phishing emails

Detecting phishing emails, think you have what it takes? Find out with this test

Detecting phishing emails can be very difficult as attackers find more and more creative ways to conceal them. What is phishing? Phishing is when an attacker sends an email that… Read more »

Network Security, Phishing   

After January 14, 2020 Windows 7 will be a HIPAA violation

HIPAA Security Rule requires that all software be updated and current. If the software is no longer supported by the vendor, it is not HIPAA compliant. [DISPLAY_ULTIMATE_SOCIAL_ICONS]

Cartoons   

HIPAA compliant website – What does it take to make your site HIPAA compliant?

Most businesses today have a website. A website is a useful tool to educate prospective customers about your services and help to make contact with them. Websites allow your business… Read more »

HIPAA Compliance   

Password managers make using the Internet much easier

[DISPLAY_ULTIMATE_SOCIAL_ICONS]

Cartoons   

Its HIPAA, not HIPPA….

[DISPLAY_ULTIMATE_SOCIAL_ICONS]

Cartoons   

Case Study – Controlling who accesses your ePHI

HIPAA is mostly concerned with patient privacy. This is to protect who does what with their data. one of the parts of this is controlling who accesses your ePHI. One… Read more »

Case Studies   
medical identity theft

Medical Identity Theft Is On The Rise

When people think of identity theft, they usually think of their personal credit being used to open new credit or loan accounts. But there is another type of identity theft… Read more »

Identity Theft   

Password Security – The 25 most common passwords of 2018

Password security is a cornerstone to most of the security systems we use to protect our data. Whether its pin codes of debit cards, passwords for social media sites, or… Read more »

Computer Security   

Case Study – Phishing Attack Breaches Practice

Phishing attacks may be the most threatening to healthcare entities as well as companies in the United States. According to some estimates, phishing attacks increased 59% in 2017 alone. Most… Read more »

Case Studies, Phishing   

Do cloud based EMRs make HIPAA irrelevant? Not in a phishing attack

We often hear that if an office uses a cloud based EMR (rather than having a server in the office), that they don’t need to worry about HIPAA anymore. The… Read more »

Cartoons   
« Previous 1 … 10 11 12 13 14 Next »

Recent Posts

  • Phishing Attacks: AI Used in Virtual Meeting to Steal Millions
  • Vendor Breaches: The Risk to Your HIPAA Compliance
  • IoT Security: We Don’t Need to Connect EVERYTHING to the Web
  • Phishing Emails: Lock Down Your Email to Prevent Breaches
  • Secure Mobile Devices Against Hackers and HIPAA Breaches

Categories

  • BDR
  • Business Associates
  • Cartoons
  • Case Studies
  • Computer Security
  • Display
  • HIPAA Compliance
  • HIPAA Training
  • HIPAA Violations
  • Identity Theft
  • IT Services
  • Network Security
  • Phishing
  • Quick Wins
  • Ransomware
  • Risk Assessment

Copyright © 2023 Iron Comet Consulting, Inc.
>

.

. .

.

Thank you for submitting form..!