Author: Tyler Howard (Tyler Howard)

thank you from doctors and nurses
Post

A Holiday wish to all of our clients!

As we get ready to embark upon the holidays, the team at MedSafe would like to take a moment to thank all of our clients who have dedicated their lives to making a difference. While the majority of us will be enjoying holiday festivities with family and friends, many of you will forego time with your...

Flu-Season-Article
Post

It’s Flu Season! Are you Ready?

It’s no secret that we are in the peak of flu season! Whether you are a nurse, primary care physician, or healthcare professional you are not only susceptible to the virus itself, but you also play a significant role in helping to protect patients against influenza. The CDC recommends that all healthcare workers get vaccinated...

hacker-FB
Post

Breach Notification- What Do Practices Need to Know?

According to the HIPAA Breach Notification Rule, all covered entities and their business associates are required to report any breach of protected health information. It is essential to understand and implement all breach notification requirements or risk incurring financial penalties as high as $1,500,000 from state attorneys general and the HHS’ Office for Civil Rights....

Hipaa compliant
Post

HIPAA and MACRA/MIPS 2018- What You Need To Know

As we move towards the end of the year, many practices and physicians are starting to consider the data they will need to submit under the MACRA/MIPS program.  The MACRA/MIPS rules change slightly every year, and this year is no exception.  Even though the rules have been adjusted, a basic requirement remains in place:  You...

blog_risk-assessment-methodology_featured-img
Post

What is a Security Risk Assessment and Why Does My Practice Need One?

According to the Health Insurance Portability and Accounting Act of 1996 (HIPAA) Security Rule covered entities (CEs) and business associates (Bas) that have access to electronic personal health information (EPHI) are required to implement safeguards necessary to protect it. This includes but is not limited to, conducting a security risk analysis to meet the standards...

OCR Guidance on Software Vulnerabilities
Post

OCR Guidance on Software Vulnerabilities and Patching

Under the HIPAA security rule, HIPAA covered entities (CEs) and business associates (BAs) are required to protect their electronic personal health information (ePHI), which typically involves identifying and mitigating software vulnerabilities that could put (ePHI) at risk. It also includes conducting a risk analysis, and implementing actions that will reduce these risks. Mitigation activities may...

legal advice about medical treatment on computer
Post

New York State Passes Sexual Harassment Law with Training and Policy Requirements

The State of New York has signed into law a bill designed to prevent sexual harassment in the workplace. The sweeping new legislation includes the requirement of sexual harassment policies and sexual harassment training for New York State employers. Those organizations who do not have prevention guidelines, anti-harassment policies, and training programs in place should...

patch-management-process-best-practices
Post

Patch Management- What is Patch Management and Why Should You Care?

Healthcare organizations nationwide remain focused on their IT security, as more and more cyberattacks wreak havoc across the industry. Within the last two years, nearly 50% of companies have experienced a data breach, and the severity of these attacks appear to be getting worse. According to a recent survey conducted by Poneman Institute, healthcare and...

business-email-compromise-feature
Post

Business E-mail Compromise: How to Protect Your Organization

In 2016, the FBI released a public service announcement warning that “business email compromise (BEC) scams have increased by 1,300% since 2015 and have cost businesses more than $3 billion. Making it a significant threat that businesses should be aware of to reduce the likelihood of becoming a victim. What is BEC? BEC is a...