HIPAA Blog

Make sure to make available patient records on a timely basis

HIPAA is often described as dealing with CIA – the Confidentiality, Integrity and Access to patient records. In the past, access to patient records often required a written request, accompanied by a response in the mail that could take several weeks. However, in today’s world where electronic systems can provide almost instant action to data, …

The post Make sure to make available patient records on a timely basis appeared first on HIPAA Secure Now!.

Tips for securing ePHI on mobile devices

While mobile devices play a major role in how we stay connected to the world in our personal lives, they are also becoming increasingly popular in our work environments. Not only are mobile devices such as smartphones, tablets and laptops convenient in the workplace, but they can also help increase productivity. In its October cybersecurity …

The post Tips for securing ePHI on mobile devices appeared first on HIPAA Secure Now!.

Avoiding MIPS Penalty: There’s an App for That!

This is a guest post by Pawan Jindal of MyMIPSScore and originally appeared at the MyMIPSScore Blog In our last blog we discussed an overview of MIPS submission process. As promised, we are very excited today to announce the availability of a new feature of MyMipsScore that will allow you to avoid the MIPS penalty for free. …

The post Avoiding MIPS Penalty: There’s an App for That! appeared first on HIPAA Secure Now!.

The weakest link in cybersecurity

By now I’m sure you’ve heard that when it comes to information security, employees are the weakest link. Organizations often emphasize that despite any security measures they put in place to protect their infrastructure, all it takes is one employee who is not following the rules to undo all of that. An article on TechRepubic …

The post The weakest link in cybersecurity appeared first on HIPAA Secure Now!.

Security risks can be a MIPS score killer

Prolonging the process of figuring out quality measures under the Medicare Access and CHIP Reauthorization Act of 2015 (MACRA) and increasing scores for the Merit-Based Incentive Payment System (MIPS) could put medical practices at a competitive disadvantage. Healthcare providers will earn a MIPS score each year, starting in 2019 (based on 2017 performance).  According to Jim Tate, president …

The post Security risks can be a MIPS score killer appeared first on HIPAA Secure Now!.

Fall prevention strategies apply to anti-phishing efforts

Patient falls have been a serious problem in hospitals and other healthcare facilities for years. In fact, in January 2013 the Agency for Healthcare Research and Quality set out to help reduce the number of falls in healthcare facilities by commissioning a RAND Corporation/ Boston University School of Public Health Report. The report, titled “Preventing …

The post Fall prevention strategies apply to anti-phishing efforts appeared first on HIPAA Secure Now!.

Study finds cybercriminals favor small businesses

As ransomware continues to grow, so do the millions of dollars businesses are dishing out to cybercriminals in hopes of regaining control of their sensitive data.  An article on Fox Business looks at a study released by data security solutions firm Datto to see how ransomware is affecting small-to-mid-sized businesses. According to the study, in …

The post Study finds cybercriminals favor small businesses appeared first on HIPAA Secure Now!.

5 ways a hacker may target your small business

Cyberattacks only happen to large corporations because they hold the most personal and sensitive data, right? Wrong. While the media often leads us to believe cyberattacks are only occurring on high-profile organizations holding a lot of data, the statistics show us otherwise. An article on Information Security Buzz takes a look at 5 ways hackers …

The post 5 ways a hacker may target your small business appeared first on HIPAA Secure Now!.

5 ways a hacker may target your small business

Cyberattacks only happen to large corporations because they hold the most personal and sensitive data, right? Wrong. While the media often leads us to believe cyberattacks are only occurring on high-profile organizations holding a lot of data, the statistics show us otherwise. An article on Information Security Buzz takes a look at 5 ways hackers …

The post 5 ways a hacker may target your small business appeared first on HIPAA Secure Now!.

Sign Up to Receive Our HIPAA Newsletter!

Fill out the form below:

  • This field is for validation purposes and should be left unchanged.

Archives