Healthcare Cybersecurity News

QI’s Experts talk Cyber, HIPAA Compliance, and everything you need to know to keep your patients safe.

When An Initial Attack May Be Just The Tip Of The Iceberg

 

Annual Breach Notification Deadline Approaching

 

How To Protect Against Snooping

The Growing Interest In Access

Jan 11, 2018 | PHI Security

Benefits to Patient Access to Health Records

 Last week the U.S. Department of Health and Human Service Office For Civil Rights (“OCR”) rolled out a..

Where In The Cloud Is Your PHI?

Storing Protected Health Information (“PHI”) in the cloud can be a very useful thing for covered entities and business associates.  As we know, HIPAA..

Can I Send Patient Information To...?

One of the most common questions I hear is, “Can I send patient information to…” with a plethora of situations and organizations completing that..

Guarding Against Insider Threats

Last week Anthem began informing 18,000 customers of a breach. It stemmed from a vendor’s employee who emailed Anthem members’ data to a personal email..

Termination of User Access

Every covered entity and business associate, whether large or small, struggles with prompt termination of user access. Whether it be interns, temporary or..

Implementing Restricted Communications

Far too often HIPAA is used as a barrier for appropriate PHI sharing. However, when a patient wants to create a barrier to sharing in the form of a..

What To Do With Unexecuted Business Associate Agreement

Transferring PHI without an executed Business Associate Agreement ("BAA") has become a point of intense focus for federal regulators, and one from which..