Why Your Employees Break the Rules
By Art Gross – It’s no secret that employees violate security policies. Whether we’d like to admit it or not, there’s a good chance we have all violated a security policy once upon a time.
Read MoreBy Art Gross – It’s no secret that employees violate security policies. Whether we’d like to admit it or not, there’s a good chance we have all violated a security policy once upon a time.
Read MoreBy Sheba Vine – HIPAA provides patients with fundamental rights to access, inspect and obtain a copy of their health information for as long as the information is maintained by the healthcare provider (covered entity) regardless of the date created, format of the PHI or where the PHI originated.
By Sonia Arista – Most cybercriminal behavior can be reduced to two basic economic drivers. The first is to look for targets with valuable resources that can be easily turned into profits. And the second is to expend as few resources as possible to access those resources.
By David Harlow – At the close of National Cybersecurity Awareness Month, a number of cybersecurity tips were published by OCR (the office within HHS that enforces HIPAA). These are timely and important reminders, relevant to everyone in the regulated community of covered entities and business associates.
By Art Gross – Cybercriminals have been targeting the healthcare industry for years. As healthcare has become the second largest sector of the U.S. economy, it should come as no surprise that the industry receives special attention from hackers.
By Matt Fisher – An interesting argument was posed in a recent post on databreaches[.]net about a lack of enforcement actions from the Office for Civil Rights against small or medium-sized healthcare entities that do not appropriately report breaches to either OCR and/or the individuals impacted.
By Gina McNellis – We’ve already written over the past year about expected changes to the Cancer Registry– and how extensive they are likely to be. No doubt – this is a big deal. Remember the shift from ICD-9 to ICD-10?
By Art Gross – Business email compromise (BEC) scams remain one of the most widely used attack vectors among cybercriminals to date. In fact, cybercriminals are finding so much success in exploiting human vulnerabilities through BEC scams that their frequencies have been dramatically increasing.
As we close out October and Cybersecurity Awareness Month, we asked some of our friends and industry experts to tell us something we should take away and always remember throughout the year.