How to File a HIPAA Administrative Simplification Complaint
CMS has released a new infographic with step-by-step instructions for how to file a complaint about potential noncompliance with HIPAA Administrative Simplification requirements.
Read MoreCMS has released a new infographic with step-by-step instructions for how to file a complaint about potential noncompliance with HIPAA Administrative Simplification requirements.
Read MoreBy Kayla Matthews – HIPAA is something that should be in the back of every health care professional’s mind. This act protects patient health information (PHI), but in a casual setting such as the home, it can be easy to overlook HIPAA and your responsibility to your patient.
By Chris Bowen – In part one of this series, we talked about healthcare’s broad adoption of cloud and the advantages that are driving that transformation. Now let’s explore what you need to be considering with regard to security and compliance as you migrate to the cloud.
By Matt Fisher – With the number of cyberattacks focusing on healthcare for purposes ranging from destruction of data to impersonating a physician or other clinician to just taking data, it is truer than ever that a successful attack is only a matter of time.
By Art Gross – Approximately 25,000 patients are being notified by Adirondack Health that their protected health information (PHI) may have been obtained by a hacker. Vermont-based Adirondack Health is part of the Adirondacks Accountable Care Organization…
By Art Gross – Cybercriminals continue to flex their muscles on the healthcare industry with ransomware hitting an Ohio medical practice earlier this month. NEO Urology in Boardman, Ohio, suffered a complex ransomware attack, with hackers encrypting the organization’s entire computer system.
The challenges of cybersecurity in healthcare are continuing to be top stories this year. Here are some resources and thoughts from thought leaders in the industry on helping with these challenges.
By Art Gross – In 2018, 71% of ransomware attacks targeted small businesses, according to a report by Beazley Breach Response Services. It’s clear that small businesses are a cybercriminals favorite target, yet many remain unprepared to handle a cyber-attack.
By William O’Toole – To BA or not to BA? When a covered entity contracts with two vendors for interface software between the vendors’ systems each vendor is a business associate of the covered entity, no different than before the interface project.