Healthcare Cybersecurity News

QI’s Experts talk Cyber, HIPAA Compliance, and everything you need to know to keep your patients safe.

Adam Bullian

Adam Bullian
Adam has nearly ten years experience assisting organizations of all sizes and types develop appropriate security and privacy safeguards. He has conducted numerous security and privacy risk assessments, analyzed and developed policies, procedures, and plans, as well as created and delivered security and privacy awareness training to multiple organizations. He is a frequently writer and presenter on health care privacy and security topics, and his HIPAA Highlight newsletter is read by thousands of readers a month. He holds bachelors degrees in History and Political Science from West Virginia University, and a Juris Doctorate degree from West Virginia University College of Law.
Find me on:

Recent Posts

Completed a Risk Analysis...Now What?

OCR has focused so much on risk analysis that there is a common misperception in the industry that a risk analysis is the primary task needed to be..

Storing PHI Offshore

A fundamental aspect of risk management and HIPAA compliance is knowing where the Protected Health Information (“PHI”) you create, store, maintain, or..

How To Properly Dispose of ePHI

The proper destruction of electronic Protected Health Information (“ePHI”) is often overlooked and, if done improperly, can lead to impermissible..

Selecting Security and Privacy Officers

An often overlooked aspect of HIPAA compliance is the selection of a HIPAA Security Officer and HIPAA Privacy Officer. These roles are often filled by..

Annual Breach Notification Deadline Approaching


If you had a breach in 2017 that affected less than 500 individuals, the deadline to notify the U.S. Department of Health and Human Services (“HHS”)..

How To Protect Against Snooping

Snooping of Protected Health Information (“PHI”) is perhaps one of the largest causes of breaches.  Some studies estimate a quarter of all breaches..

DIY: HIPAA Enforcement

Jan 25, 2018 | Healthcare Compliance

I frequently write about HIPAA enforcement by the Office for Civil Rights at the U.S. Department of Health and Human Services ("OCR"). However, there..

Decrease Rate of Vulnerbility to Ransom Attacks in 2018

Jan 11, 2018 | Risk Analysis

A recent survey indicated some interesting trends in ransomware attacks against small-to-medium size businesses (“SMBs”). According to the survey of..

The Growing Interest In Access

Jan 11, 2018 | PHI Security

Having patients access their health records has important clinical benefits, which is a significant reason why it is a right patients are provided in ..

How to Protect Against the KRACK Vulnerability

The KRACK WIFI vulnerability was announced by security researchers and the US-CERT today. This vulnerability can affect every modern WIFI network and..