Completing your Risk Assessment is only the first step in the journey to secure Protected Health Information (“PHI”). A risk assessment simply..
A recent survey indicated some interesting trends in ransomware attacks against small-to-medium size businesses (“SMBs”). According to the survey of..
The proper destruction of electronic Protected Health Information (“ePHI”) is often overlooked and, if done improperly, can lead to impermissible..
Recent events indicate what we have long suspected; attackers often target the same organizations again after a successful attack. This exact scenario..
The KRACK WIFI vulnerability was announced by security researchers and the US-CERT today. This vulnerability can affect every modern WIFI network and..
Do you know exactly where that PHI is stored by the cloud provider? In some instances the cloud storage vendor might store, backup, or process the PHI..
In the wake of two damaging hurricanes, the topic of emergency preparedness is at the top of mind for many Covered Entities and Business Associates...