One of the most overlooked but critical aspects of HIPAA compliance is medical equipment management and decommissioning equipment and media that..
Effective access control is a fundamental part of securing Protected Health Information (“PHI”). Access control is essentially giving access when and..
A recent survey indicated some interesting trends in ransomware attacks against small-to-medium size businesses (“SMBs”). According to the survey of..
Transferring PHI without an executed Business Associate Agreement ("BAA") has become a point of intense focus for federal regulators, and one from..
OCR has focused so much on risk analysis that there is a common misperception in the industry that a risk analysis is the primary task needed to be..
The proper destruction of electronic Protected Health Information (“ePHI”) is often overlooked and, if done improperly, can lead to impermissible..
Recent events indicate what we have long suspected; attackers often target the same organizations again after a successful attack. This exact scenario..
An often overlooked aspect of HIPAA compliance is the selection of a HIPAA Security Officer and HIPAA Privacy Officer. These roles are often filled by..
If you had a breach in 2017 that affected less than 500 individuals, the deadline to notify the U.S. Department of Health and Human Services (“HHS”)..