Changes for HIPAA Enforcement – News From the 2019 HIPAA Summit
The 2019 HIPAA Summit recently ended and boy, was there a lot of information given out. The keynote was given by Roger Severino, the Director of the Department of Health… Read more »
The 2019 HIPAA Summit recently ended and boy, was there a lot of information given out. The keynote was given by Roger Severino, the Director of the Department of Health… Read more »
Health apps have begun to boom as users want to track various aspects of their health. Many are designed to encourage healthier living or to help with various health issues…. Read more »
A ransomware attack can be a frightening thing and they are increasing. This threat poses a higher danger to medical practices because of HIPAA regulations. A ransomware infection for HIPAA… Read more »
As practices start to upgrade their Windows 7 computers, what they will do with the old computers is an important consideration. Before donating or giving them away, make sure the… Read more »
In the technology field, it’s inevitable that older devices get replaced. With Windows 7 reaching its end of life in January 2020, many practices will be doing just that. But… Read more »
Laptops have become extremely common in medical practices. Their portability allows for physicians to take them from room to room to chart patient visits. But their portability is also what… Read more »
If your practice uses mobile devices, be sure to encrypt them. If they are stolen and contain PHI, it could lead to very expensive fines.
A new study has revealed that despite numerous online breaches, users are still using weak passwords. The study has shown that the situation isn’t getting better and users aren’t changing… Read more »
The HIPAA Security Rule requires that all Covered Entities and Business Associates conduct a thorough Risk Assessment of their businesses. This was first introduced in the Privacy Rule but was… Read more »
How important is a HIPAA Risk Assessment for your practice? Besides being required under the HIPAA Security Rule, 45 CFR § 164.308(a)(1)(ii)(A), it’s also critical for the security of your… Read more »