Health Information Technology
Eagle specializes in services related to Health Information Technology, including services to help physician practices select and implement electronic health record and other technologies, performing a wide variety of HIPAA security related services including creation of HIPAA Security Policies, conducting HIPAA audits, performing the HIPAA Security Risk Analysis, conducting technical vulnerability analyses and a variety of other services.
by Gary Pritts | Jan 14, 2018 | DD Boards, General News, Health Information Technology, Threat Intelligence
Meltdown and Spectre computer vulnerabilities affect HIPAA Covered Entities and Business Associates. Every computer, phone, and tablet is impacted. What are they and what do you need to know? Read our series to find out.
Read More
by Gary Pritts | Nov 8, 2017 | DD Boards, Health Information Technology, HIPAA, HIPAA Policy Templates
How do you ensure cloud storage HIPAA compliance? There are a number of file storage services in the cloud and if you are designated a business associate for a healthcare payer or provider you need to form the right policies and agreements.
Read More
by Katie Pellegrino | Jun 13, 2017 | General News, Health Information Technology
Molina Healthcare, a leading Medicaid and Affordable Care Act insurer across 12 states, recently suffered a security breach in which patient records were exposed on their online subscriber portal. The application flaw, which was present on the web for nearly a month... Read More
by Katie Pellegrino | Jun 8, 2017 | General News, Health Information Technology
Approximately 15,000 documents of patients from 16 states and five countries were breached and stolen by a disgruntled employee of an LA based plastic surgery center. We review steps you can take to protect yourself from similar breaches.
Read More
by Gary Pritts | Apr 21, 2016 | General News, Health Information Technology
Ransomware is a type of malware that quickly encrypts the files of the host computer system, rendering them unusable, and then displays a message demanding a ransom within a short period of time. If the ransom is paid, the victim may receive a decryption key to... Read More
by Eagle Editor | Jan 13, 2016 | General News, Health Information Technology
How can you guard against the increasing HIPAA related breach danger and avoid fines? We’ll look at some common breach sources and review solutions.
Read More