Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity

Great healthcare cybersecurity goes beyond IT best practices. Assessing the human element is essential to developing and deploying a holistic approach to security.

The post Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity appeared first on Security Intelligence.

Continue reading Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity

10 Ways a Business Associate Can Trigger HIPAA Enforcement

The Department of Health and Human Services (“HHS”) may have signaled its interest in pursuing more enforcement actions against business associates. On May 24, 2019, the HHS Office for Civil Rights (“OCR”), released a&#160… Continue reading 10 Ways a Business Associate Can Trigger HIPAA Enforcement

HHS Announces Reduced Annual Limits on Civil Money Penalties for Most HIPAA Violations

The Department of Health and Human Services (“HHS”) recently issued a Notification of Enforcement Discretion Regarding HIPAA Civil Money Penalties (“CMPs”) in which it lowered the maximum annual fines that can be asse… Continue reading HHS Announces Reduced Annual Limits on Civil Money Penalties for Most HIPAA Violations

Managing More Medical Images Than Ever? Learn How to Better Protect Them

If not properly secured, many of the systems health care organizations use to store and share medical images could be exploited to expose patients’ PHI.

The post Managing More Medical Images Than Ever? Learn How to Better Protect Them appeared first on Security Intelligence.

Continue reading Managing More Medical Images Than Ever? Learn How to Better Protect Them

Managing More Medical Images Than Ever? Learn How to Better Protect Them

If not properly secured, many of the systems health care organizations use to store and share medical images could be exploited to expose patients’ PHI.

The post Managing More Medical Images Than Ever? Learn How to Better Protect Them appeared first on Security Intelligence.

Continue reading Managing More Medical Images Than Ever? Learn How to Better Protect Them

Health Care Providers Need to Comply With HIPAA Regulations and Address These Five Critical Security Issues

Health care organizations must address these five major cybersecurity concerns to comply with HIPAA regulations and ensure proper handling of patient data.

The post Health Care Providers Need to Comply With HIPAA Regulations and Address These Five Critical Security Issues appeared first on Security Intelligence.

Continue reading Health Care Providers Need to Comply With HIPAA Regulations and Address These Five Critical Security Issues

Health Care Providers Need to Comply With HIPAA Regulations and Address These Five Critical Security Issues

Health care organizations must address these five major cybersecurity concerns to comply with HIPAA regulations and ensure proper handling of patient data.

The post Health Care Providers Need to Comply With HIPAA Regulations and Address These Five Critical Security Issues appeared first on Security Intelligence.

Continue reading Health Care Providers Need to Comply With HIPAA Regulations and Address These Five Critical Security Issues

HIPAA Settlements of 2016: Lessons Learned

The HIPAA settlements from 2016 reinforce the importance of risk analysis when creating policies and procedures to protect PHI.

The post HIPAA Settlements of 2016: Lessons Learned appeared first on Security Intelligence.

Continue reading HIPAA Settlements of 2016: Lessons Learned

HIPAA, Fines and Your Business Associate Agreement

Health care companies must review every business associate agreement to ensure that it aligns with HIPAA requirements and that PHI is properly secured.

The post HIPAA, Fines and Your Business Associate Agreement appeared first on Security Intelligence.

Continue reading HIPAA, Fines and Your Business Associate Agreement

Breaking Borders: Is HIPAA History in a Post-EHR World?

The rash of cyberattacks on health care organizations has highlighted the need for the industry to move beyond HIPAA to develop stronger security strategies.

The post Breaking Borders: Is HIPAA History in a Post-EHR World? appeared first on Security Intelligence.

Continue reading Breaking Borders: Is HIPAA History in a Post-EHR World?