• Home
  • About Us
  • Contact Us
  • Home
  • About Us
  • Contact Us
Your HIPAA Guide
Skip to content
  • Home
  • About Us
  • Contact Us

HIPAA Training Requirements – What Do Small Practices Need To Do?

HIPAA regulations are often difficult for small practices to understand. The rules are written so say that Covered Entities and Business Associates must do what is reasonable and appropriate to… Read more »

HIPAA Compliance, HIPAA Training   

Ransomware Alert – SamSam Advisory from Homeland and FBI

The SamSam ransomware is making the rounds. The US Department of Homeland Security and the Federal Bureau of Investigation have released an alert through the US Computer Emergency Readiness Team… Read more »

Computer Security, HIPAA Compliance, Ransomware   

Case Study – No Business Associate Agreement results in $500,000 fine

A Business Associate Agreement (BAA) is one of the core items contained within HIPAA regulations. If a Covered Entity doesn’t have them in place with their outside vendors, then they… Read more »

HIPAA Compliance   

Risk Assessment – What is it and why is it so important under HIPAA?

Covered Entities and Business Associates must perform a yearly Risk Assessment under HIPAA law according to §164.308, the Security Rule. It was first added in 2003 in the Privacy Rule… Read more »

HIPAA Compliance   

How to make a secure password that is uncrackable

Passwords. We use them in so many areas of our lives and we all hate them. Passwords for our banking sites, for social media, our phones, and our computers. Passwords… Read more »

Computer Security   
firewall, Unified Threat Management

83% of all consumer routers vulnerable, offer no protection for ePHI

Does your office use a consumer router from one of the following vendors as its access to the Internet? D-Link TP-Link Netgear Linksys Asus AVM Belkin Cerio TrendNet Zyxel

Network Security   

Case Study – No firewall equals expensive HIPAA violation

In this week’s case study we will be discussing firewalls and why they are important. HIPAA requires that Covered Entities and Business Associates have reasonable and appropriate network security to… Read more »

Case Studies, HIPAA Violations   

Sometimes a picture can cost thousands of dollars!

Sometimes talking a selfie at the office can be expensive! It we aren’t careful, it can result in a HIPAA violation. This actually happened at one of our sites. An… Read more »

Cartoons   
phishing email attack, phishing emails

Phishing attack exposes 20,000 patient records

One of the biggest external threats to a practice’s Protected Health Information (PHI) is phishing. This can be seen in many breaches that are reported to the Department Of Health… Read more »

Computer Security, Phishing   

Lost laptop? Does it contain PHI?

Losing a laptop or tablet is bad enough, but what about when it has Protected Health Information (PHI) on it? That turns a bad day into a disaster. Mobile devices… Read more »

Cartoons   
« Previous 1 … 11 12 13 14 Next »

Recent Posts

  • Phishing Attacks: AI Used in Virtual Meeting to Steal Millions
  • Vendor Breaches: The Risk to Your HIPAA Compliance
  • IoT Security: We Don’t Need to Connect EVERYTHING to the Web
  • Phishing Emails: Lock Down Your Email to Prevent Breaches
  • Secure Mobile Devices Against Hackers and HIPAA Breaches

Categories

  • BDR
  • Business Associates
  • Cartoons
  • Case Studies
  • Computer Security
  • Display
  • HIPAA Compliance
  • HIPAA Training
  • HIPAA Violations
  • Identity Theft
  • IT Services
  • Network Security
  • Phishing
  • Quick Wins
  • Ransomware
  • Risk Assessment

Copyright © 2023 Iron Comet Consulting, Inc.
>

.

. .

.

Thank you for submitting form..!