March 8, 2018

Surveys confirm that consumers are increasingly worried about their healthcare information being hacked.

Providing health consultation online is very convenient, cheaper and timely but there's no assurance that your information is secured. The medical industry needs to...

March 5, 2018

Cyber security experts suggest that heightened protection for medical devices is needed more than ever.

With life-changing advances in medical equipment, researchers say that increasing risks posed by cyber-attacks can put patients in danger. A recent study in conjuncti...

October 12, 2017

HIPAA email encryption rules do not exclusively apply to emails, but to all communications which include:

  • attachments to emails

  • SMS

  • IMs

These are all governed by HIPAA rules for email encryption, which states you need to implement a mechanism to encrypt...

September 29, 2017

        The U.S. Branch of Health and Human Services (HHS) characterizes "ransomware" as a kind of noxious programming, or malware that "endeavors to deny access to a client's information, typically by encoding the information with a key known just to the programmer wh...

September 26, 2017

     The risk of an unauthorized disclosure of ePHI from a personal mobile device is significant, and yet many organizations have failed to secure their environments. They have instituted a BYOD (Bring Your Own Device) policy due to ease of use. This can all too e...

September 8, 2017

1. The nature and degree of the secured well being data included, including

     the sorts of identifiers and the probability of re-recognizable proof.

2. The unapproved individual who utilized the ensured well being data or to

     whom the exposure was made....

September 7, 2017

What are HIPAA authoritative protections?

The HIPAA Security Rule depicts authoritative shields as approaches and methodology outlined "to deal with the determination, improvement, execution, and upkeep of safety efforts to ensure electronic secured wellbeing data and t...

September 6, 2017

       The privacy rules of HIPAA, establish the standards of using and handling patients information, which is called Protected Health Information (PHI). HIPAA has ensured the integrity and provenance of sharing of PHI amongst organizations. Security and privacy regul...

August 22, 2017

According to Accenture analysis, healthcare providers that do not make cyber security a strategic priority will put $305 billion of cumulative lifetime patient revenue at risk over the next five years. Now is the time for healthcare providers, health plans and other or...

July 24, 2017

The Office of the National Coordinator for Health Information Technology (ONC) offers 10 tips for cybersecurity in health care: (We have added some great tips to assist you with your Medical Cyber Security)

1. Establish a security culture. Help your staff understand the...

Please reload

Follow Us
Recent Posts
Search By Tags
Archive
Featured Posts

I'm busy working on my blog posts. Watch this space!

Please reload