HIPAA Blog

Tips for securing ePHI on mobile devices

While mobile devices play a major role in how we stay connected to the world in our personal lives, they are also becoming increasingly popular in our work environments. Not only are mobile devices such as smartphones, tablets and laptops convenient in the workplace, but they can also help increase productivity. In its October cybersecurity …

The post Tips for securing ePHI on mobile devices appeared first on HIPAA Secure Now!.

Avoiding MIPS Penalty: There’s an App for That!

This is a guest post by Pawan Jindal of MyMIPSScore and originally appeared at the MyMIPSScore Blog In our last blog we discussed an overview of MIPS submission process. As promised, we are very excited today to announce the availability of a new feature of MyMipsScore that will allow you to avoid the MIPS penalty for free. …

The post Avoiding MIPS Penalty: There’s an App for That! appeared first on HIPAA Secure Now!.

The weakest link in cybersecurity

By now I’m sure you’ve heard that when it comes to information security, employees are the weakest link. Organizations often emphasize that despite any security measures they put in place to protect their infrastructure, all it takes is one employee who is not following the rules to undo all of that. An article on TechRepubic …

The post The weakest link in cybersecurity appeared first on HIPAA Secure Now!.

Security risks can be a MIPS score killer

Prolonging the process of figuring out quality measures under the Medicare Access and CHIP Reauthorization Act of 2015 (MACRA) and increasing scores for the Merit-Based Incentive Payment System (MIPS) could put medical practices at a competitive disadvantage. Healthcare providers will earn a MIPS score each year, starting in 2019 (based on 2017 performance).  According to Jim Tate, president …

The post Security risks can be a MIPS score killer appeared first on HIPAA Secure Now!.

Fall prevention strategies apply to anti-phishing efforts

Patient falls have been a serious problem in hospitals and other healthcare facilities for years. In fact, in January 2013 the Agency for Healthcare Research and Quality set out to help reduce the number of falls in healthcare facilities by commissioning a RAND Corporation/ Boston University School of Public Health Report. The report, titled “Preventing …

The post Fall prevention strategies apply to anti-phishing efforts appeared first on HIPAA Secure Now!.

Study finds cybercriminals favor small businesses

As ransomware continues to grow, so do the millions of dollars businesses are dishing out to cybercriminals in hopes of regaining control of their sensitive data.  An article on Fox Business looks at a study released by data security solutions firm Datto to see how ransomware is affecting small-to-mid-sized businesses. According to the study, in …

The post Study finds cybercriminals favor small businesses appeared first on HIPAA Secure Now!.

5 ways a hacker may target your small business

Cyberattacks only happen to large corporations because they hold the most personal and sensitive data, right? Wrong. While the media often leads us to believe cyberattacks are only occurring on high-profile organizations holding a lot of data, the statistics show us otherwise. An article on Information Security Buzz takes a look at 5 ways hackers …

The post 5 ways a hacker may target your small business appeared first on HIPAA Secure Now!.

5 ways a hacker may target your small business

Cyberattacks only happen to large corporations because they hold the most personal and sensitive data, right? Wrong. While the media often leads us to believe cyberattacks are only occurring on high-profile organizations holding a lot of data, the statistics show us otherwise. An article on Information Security Buzz takes a look at 5 ways hackers …

The post 5 ways a hacker may target your small business appeared first on HIPAA Secure Now!.

Engage Users in Cybersecurity Training

As you may know, successful cyberattacks often come as a result of human error, but did you know those errors are often made by employees who have already been through training? An article on Healthcare IT News takes a look at what methods help cybersecurity training stick. Cybercriminals direct their attacks on untrained employees or …

The post Engage Users in Cybersecurity Training appeared first on HIPAA Secure Now!.

Page 1 of 1112345...10...Last »

Sign Up to Receive Our HIPAA Newsletter!

Fill out the form below:

  • This field is for validation purposes and should be left unchanged.

Archives