It’s no secret that we are in the peak of flu season! Whether you are a nurse, primary care physician, or healthcare professional you are not only susceptible to the virus itself, but you also play a significant role in helping to protect patients against influenza. The CDC recommends that all healthcare workers get vaccinated...
Author: Tyler Howard (Tyler Howard)
Breach Notification- What Do Practices Need to Know?
According to the HIPAA Breach Notification Rule, all covered entities and their business associates are required to report any breach of protected health information. It is essential to understand and implement all breach notification requirements or risk incurring financial penalties as high as $1,500,000 from state attorneys general and the HHS’ Office for Civil Rights....
HIPAA and MACRA/MIPS 2018- What You Need To Know
As we move towards the end of the year, many practices and physicians are starting to consider the data they will need to submit under the MACRA/MIPS program. The MACRA/MIPS rules change slightly every year, and this year is no exception. Even though the rules have been adjusted, a basic requirement remains in place: You...
What is a Security Risk Assessment and Why Does My Practice Need One?
According to the Health Insurance Portability and Accounting Act of 1996 (HIPAA) Security Rule covered entities (CEs) and business associates (Bas) that have access to electronic personal health information (EPHI) are required to implement safeguards necessary to protect it. This includes but is not limited to, conducting a security risk analysis to meet the standards...
OCR Guidance on Software Vulnerabilities and Patching
Under the HIPAA security rule, HIPAA covered entities (CEs) and business associates (BAs) are required to protect their electronic personal health information (ePHI), which typically involves identifying and mitigating software vulnerabilities that could put (ePHI) at risk. It also includes conducting a risk analysis, and implementing actions that will reduce these risks. Mitigation activities may...
New York State Passes Sexual Harassment Law with Training and Policy Requirements
The State of New York has signed into law a bill designed to prevent sexual harassment in the workplace. The sweeping new legislation includes the requirement of sexual harassment policies and sexual harassment training for New York State employers. Those organizations who do not have prevention guidelines, anti-harassment policies, and training programs in place should...
Patch Management- What is Patch Management and Why Should You Care?
Healthcare organizations nationwide remain focused on their IT security, as more and more cyberattacks wreak havoc across the industry. Within the last two years, nearly 50% of companies have experienced a data breach, and the severity of these attacks appear to be getting worse. According to a recent survey conducted by Poneman Institute, healthcare and...
Business E-mail Compromise: How to Protect Your Organization
In 2016, the FBI released a public service announcement warning that “business email compromise (BEC) scams have increased by 1,300% since 2015 and have cost businesses more than $3 billion. Making it a significant threat that businesses should be aware of to reduce the likelihood of becoming a victim. What is BEC? BEC is a...
Orangeworm is Wreaking Havoc on the Healthcare Sector
According to a recent report by Symantec security firm, a cyber group called Orangeworm has targeted the healthcare industry and is wreaking its havoc across the sector worldwide. The group has been unleashing a malware known as Trojan.Kwampirs to gain remote access and compromise the computer systems of firms in the United States, Europe, and...
HIPAA Compliance Tips for Mobile Data Security
HIPAA Compliance Tips for Mobile Data Security Nearly 4 out of 5 healthcare providers use a mobile device for professional purposes. These numbers continue to rise as healthcare organizations place an increased focus on efficiency and productivity. (1) Although mobile devices are incredibly efficient and convenient, they also harbor measurable risks for data breach and...