Author: Tyler Howard (Tyler Howard)

Flu-Season-Article
Post

It’s Flu Season! Are you Ready?

It’s no secret that we are in the peak of flu season! Whether you are a nurse, primary care physician, or healthcare professional you are not only susceptible to the virus itself, but you also play a significant role in helping to protect patients against influenza. The CDC recommends that all healthcare workers get vaccinated...

hacker-FB
Post

Breach Notification- What Do Practices Need to Know?

According to the HIPAA Breach Notification Rule, all covered entities and their business associates are required to report any breach of protected health information. It is essential to understand and implement all breach notification requirements or risk incurring financial penalties as high as $1,500,000 from state attorneys general and the HHS’ Office for Civil Rights....

Hipaa compliant
Post

HIPAA and MACRA/MIPS 2018- What You Need To Know

As we move towards the end of the year, many practices and physicians are starting to consider the data they will need to submit under the MACRA/MIPS program.  The MACRA/MIPS rules change slightly every year, and this year is no exception.  Even though the rules have been adjusted, a basic requirement remains in place:  You...

blog_risk-assessment-methodology_featured-img
Post

What is a Security Risk Assessment and Why Does My Practice Need One?

According to the Health Insurance Portability and Accounting Act of 1996 (HIPAA) Security Rule covered entities (CEs) and business associates (Bas) that have access to electronic personal health information (EPHI) are required to implement safeguards necessary to protect it. This includes but is not limited to, conducting a security risk analysis to meet the standards...

OCR Guidance on Software Vulnerabilities
Post

OCR Guidance on Software Vulnerabilities and Patching

Under the HIPAA security rule, HIPAA covered entities (CEs) and business associates (BAs) are required to protect their electronic personal health information (ePHI), which typically involves identifying and mitigating software vulnerabilities that could put (ePHI) at risk. It also includes conducting a risk analysis, and implementing actions that will reduce these risks. Mitigation activities may...

legal advice about medical treatment on computer
Post

New York State Passes Sexual Harassment Law with Training and Policy Requirements

The State of New York has signed into law a bill designed to prevent sexual harassment in the workplace. The sweeping new legislation includes the requirement of sexual harassment policies and sexual harassment training for New York State employers. Those organizations who do not have prevention guidelines, anti-harassment policies, and training programs in place should...

patch-management-process-best-practices
Post

Patch Management- What is Patch Management and Why Should You Care?

Healthcare organizations nationwide remain focused on their IT security, as more and more cyberattacks wreak havoc across the industry. Within the last two years, nearly 50% of companies have experienced a data breach, and the severity of these attacks appear to be getting worse. According to a recent survey conducted by Poneman Institute, healthcare and...

business-email-compromise-feature
Post

Business E-mail Compromise: How to Protect Your Organization

In 2016, the FBI released a public service announcement warning that “business email compromise (BEC) scams have increased by 1,300% since 2015 and have cost businesses more than $3 billion. Making it a significant threat that businesses should be aware of to reduce the likelihood of becoming a victim. What is BEC? BEC is a...

hca-healthcare-havoc-tn
Post

Orangeworm is Wreaking Havoc on the Healthcare Sector

According to a recent report by Symantec security firm, a cyber group called Orangeworm has targeted the healthcare industry and is wreaking its havoc across the sector worldwide. The group has been unleashing a malware known as Trojan.Kwampirs to gain remote access and compromise the computer systems of firms in the United States, Europe, and...

Hipaa compliance for medical devices
Post

HIPAA Compliance Tips for Mobile Data Security

HIPAA Compliance Tips for Mobile Data Security Nearly 4 out of 5 healthcare providers use a mobile device for professional purposes. These numbers continue to rise as healthcare organizations place an increased focus on efficiency and productivity. (1) Although mobile devices are incredibly efficient and convenient, they also harbor measurable risks for data breach and...