As we move towards the end of the year, many practices and physicians are starting to consider the data they will need to submit under the MACRA/MIPS program. The MACRA/MIPS rules change slightly every year, and this year is no exception. Even though the rules have been adjusted, a basic requirement remains in place: You...
Category: HIPAA Compliance
What is a Security Risk Assessment and Why Does My Practice Need One?
According to the Health Insurance Portability and Accounting Act of 1996 (HIPAA) Security Rule covered entities (CEs) and business associates (Bas) that have access to electronic personal health information (EPHI) are required to implement safeguards necessary to protect it. This includes but is not limited to, conducting a security risk analysis to meet the standards...
OCR Guidance on Software Vulnerabilities and Patching
Under the HIPAA security rule, HIPAA covered entities (CEs) and business associates (BAs) are required to protect their electronic personal health information (ePHI), which typically involves identifying and mitigating software vulnerabilities that could put (ePHI) at risk. It also includes conducting a risk analysis, and implementing actions that will reduce these risks. Mitigation activities may...
Patch Management- What is Patch Management and Why Should You Care?
Healthcare organizations nationwide remain focused on their IT security, as more and more cyberattacks wreak havoc across the industry. Within the last two years, nearly 50% of companies have experienced a data breach, and the severity of these attacks appear to be getting worse. According to a recent survey conducted by Poneman Institute, healthcare and...
Business E-mail Compromise: How to Protect Your Organization
In 2016, the FBI released a public service announcement warning that “business email compromise (BEC) scams have increased by 1,300% since 2015 and have cost businesses more than $3 billion. Making it a significant threat that businesses should be aware of to reduce the likelihood of becoming a victim. What is BEC? BEC is a...
Orangeworm is Wreaking Havoc on the Healthcare Sector
According to a recent report by Symantec security firm, a cyber group called Orangeworm has targeted the healthcare industry and is wreaking its havoc across the sector worldwide. The group has been unleashing a malware known as Trojan.Kwampirs to gain remote access and compromise the computer systems of firms in the United States, Europe, and...
HIPAA Compliance Tips for Mobile Data Security
HIPAA Compliance Tips for Mobile Data Security Nearly 4 out of 5 healthcare providers use a mobile device for professional purposes. These numbers continue to rise as healthcare organizations place an increased focus on efficiency and productivity. (1) Although mobile devices are incredibly efficient and convenient, they also harbor measurable risks for data breach and...
Navigating Mobile Devices and HIPAA
The mobile technology revolution has impacted nearly every industry across the globe, with healthcare being no exception. Hospitals, clinics, and providers have all quickly embraced the use of smartphones and other mobile devices along with the convenience of accessing important medical information quickly. Many healthcare organizations are capitalizing on the benefits that mobile devices...
SamSam Ransomware attacks Allscripts- What You Should Know
Another strain of ransomware has wreaked its havoc on the healthcare industry. This time its victims include over 45,000 medical practices and 180,000 physicians that are clients of Allscripts Healthcare Solutions, Inc. Allscripts is a publicly traded American company that provides physician practices, hospitals, and other healthcare providers with practice management and electronic health record...
The Prevalence of Sharing Passwords
Data breaches and ransomware attacks are among some of the top challenges that healthcare organizations face today. These issues can lead to extensive damage affecting entire organizations. Whether it is the breach of a patient’s privacy or the disruption of operations across an entire system, just one negative event has the potential to destroy a...