Healthcare Cybersecurity News

QI’s Experts talk Cyber, HIPAA Compliance, and everything you need to know to keep your patients safe.

When An Initial Attack May Be Just The Tip Of The Iceberg

 

How to Protect Against the KRACK Vulnerability

The KRACK WIFI vulnerability was announced by security researchers and the US-CERT today. This vulnerability can affect every modern WIFI network and..

Where In The Cloud Is Your PHI?

Storing Protected Health Information (“PHI”) in the cloud can be a very useful thing for covered entities and business associates.  As we know, HIPAA..

Emergency Preparedness Best Practices

In the wake of two damaging hurricanes, the topic of emergency preparedness is at the top of mind for many Covered Entities and Business Associates...

What To Do About Insecure Business Associates

As a Covered Entity or a Business Associate, you know you need Business Associate Agreements with entities that perform a service or a function for you..

Breach Notification Requirements

Most people in the industry believe HIPAA requires notification of a breach to the federal government and affected individuals within 60 days of discovery..

Take The Gray Out Of HIPAA - Risk Analysis Will Help

Most people with even a casual understanding of HIPAA realize there is a great deal of gray area involved in the implementation of the Rule. This is..

Guarding Against Insider Threats

Last week Anthem began informing 18,000 customers of a breach. It stemmed from a vendor’s employee who emailed Anthem members’ data to a personal email..

Termination of User Access

Every covered entity and business associate, whether large or small, struggles with prompt termination of user access. Whether it be interns, temporary or..

Implementing Restricted Communications

Far too often HIPAA is used as a barrier for appropriate PHI sharing. However, when a patient wants to create a barrier to sharing in the form of a..