Once upon a time, in a bustling digital kingdom, there lived a group of diligent data guardians tasked with protecting the realm's precious information. These guardians, known as the Sentinels of Security, were well-versed in the art of safeguarding...View Details »
Once upon a time, in a bustling digital forest, there lived a wise old squirrel named Sam. Sam was known far and wide for his cleverness and his knack for safeguarding secrets...View Details »
Do you use passwords like "123456", "iloveyou", or your pet's name? If so, you are putting your online accounts and personal information at risk. Hackers can easily guess or crack these passwords and access your data...View Details »
In a quiet forest, there stood an ancient grove known as the Whispering Woods. The Whispering Woods were not ordinary, for within their depths, a community of wise animals dwelled. Among them, there was a group of creatures known as the...View Details »
Let’s address the elephant in the room: articles on encryption, cybersecurity, and HIPAA compliance are abundant, often leading to a saturation of information. However, revisiting these topics with a fresh lens is critical as it directly impacts the...View Details »
Ever felt that heart skip when you can't locate your phone in your bag or pocket? That surge of panic? It's just a fraction of what medical professionals feel when they sense a hint of vulnerability in patient data security. For our indispensable...View Details »
Maintaining HIPAA compliance is crucial for any organization dealing with protected health information (PHI). However, navigating the complex requirements of the Health Insurance Portability and Accountability Act (HIPAA) can be a daunting task...View Details »
Imagine waking up one morning to a flurry of alerts and warnings— your data has been compromised. If you are one of the 11 million patients potentially impacted by the recent HCA Healthcare data breach, you don't have to imagine...View Details »
"If privacy is boiling hot... HIPAA is the fire underneath," observes Mac McMillan, a seasoned health IT leader, and CEO of CynergisTek, a top cybersecurity consulting firm. Healthcare professionals and business associates like IT professionals...View Details »
Robust authentication measures enhance the security of electronic protected health information (ePHI), reduce the risk of unauthorized access or breaches, and demonstrate compliance with HIPAA's requirements for safeguarding patient information...View Details »
Healthcare workers in the United States must navigate the complexities of Protected Health Information (PHI) and the Health Insurance Portability and Accountability Act (HIPAA). This is especially true for healthcare workers who may not yet...View Details »
Columbus Children's Hospital in Ohio is under scrutiny following a recent investigation conducted by the US Department of Labor. The investigation revealed that the hospital failed to safeguard its employees, including nurses...View Details »
System patches are like digital shields that enhance security and optimize performance. They fix vulnerabilities and protect against evolving cyber threats...View Details »
Healthcare compliance is crucial to the smooth operations of healthcare organizations, and it is essential to comply with all relevant laws and regulations to avoid legal issues and maintain...View Details »
Here are the top 5 reasons for HIPAA fines and violations that every Covered Entity and Business Associate should know:View Details »
Healthcare professionals, HIPAA Covered Entities, and Business Associates are all tasked with protecting the sensitive health information of patients. The recent $875,000 penalty imposed on OSU-CHS for HIPAA violations should serve as a wake-up call...View Details »
While Medicare is designed to ensure access to affordable healthcare, healthcare providers must adhere to strict guidelines to avoid violations and fines.View Details »
Digitalization acceleration. With the advent of modernization and technology, we see digitalization as a valuable and convenient method of doing transactions in our daily life. For instance...View Details »
As the need and dependency of people and businesses on computers, mobile gadgets, electronic data, and a variety of programs and applications consistently...View Details »
The University of Rochester Medical Center (URMC) has paid a $3 million HIPAA penalty to the Office for Civil Rights (OCR) of the U.S. Department of Health and Human Services...View Details »
• Forgotten to remove access of a departing employee?
• Forgotten to collect devices with potential PHI from departing employees?...
On March 23, 2021, acting United States Attorney M. Rhett DeHart announced that according to the Federal Bureau of Investigation’s 2020 Internet Crime Report, South Carolinians lost more than...View Details »
We certainly live in interesting times. I mean, my mother that is 87 years old, received a tablet for her Christmas present. My three-year-old grandson uses his mother's cell phone...View Details »
In an ideal world, each healthcare provider (aka Covered Entity) has a...
Does HIPAA mention anything about passwords?
Yes. Password and Password Management are explicitly stipulated in the following provisions:
First, under "Definitions" [45 CFR 164.304] of the "Security...
Allow access to ePHI only to those granted access rights. Implementation specifications under Access Control...
Also known as Accounting of Disclosures of Protected Health Information, it is a mandate under 45 CFR § 164.528 of the Security and Privacy, Subpart E - Privacy of Individually Identifiable Health Information...View Details »
With the current critical and dangerous events unfolding, there is no avoiding discussion of unsettling threats – particularly cyber threats...View Details »
Q: Is a HIPAA Security Officer necessary? Can we make do without having one? A: The short answer is "No."...View Details »
In 2016, the 21st Century Cures Act came into effect under President Obama; as of April 5th, 2021, the program rule on...View Details »
Physical Safeguards (45 CFR § 164.304) refers to physical measures, policies, and procedures to protect a covered entity’s or business...View Details »
The U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR), issued a fact sheet enumerating a list of HIPAA...View Details »
“Encryption is a method of converting an original message of regular text into encoded text. The text is encrypted by means of an algorithm...View Details »
By this time you should have a basic understanding of cybersecurity, cyber attacks, cyber tools, and malware. If you need a refresher on these...View Details »
The words "policies" and "procedure(s)" are not specifically defined in HIPAA. However, in the publication...View Details »
Assigning a HIPAA Security Officer is one of the mandates of HIPAA as indicated in 45 CFR § 164.308 (a) (2). It specifically...View Details »
Aetna has entered into a resolution agreement with the Office of the Civil Rights (OCR), U.S. Department of Health and Human Services...View Details »