Health IT, HIPAA, and the CMS Incentive Programs Blog
For physicians, hospitals, government agencies, and business associatesHeard in the Hallways at the OACB: Free Cybersecurity for County Boards!
In the corridors during the OACB Convention, I had the opportunity to chat with the Information Technology leadership from an Eagle client, one of the state's largest DD Boards, who shared the benefits of their participation in the Multi-State Information Sharing and...
OACB Reflections: Improving the Customer Experience While Maintaining HIPAA Compliance
Eagle Consulting Partners was pleased to participate in the OACB Annual Conference in Columbus, which included a focus on improving the customer experience. Over our 18 years of working with over 70 of the Ohio County Boards in the area of HIPAA compliance, we are...
Office 365 Users, Time to Upgrade your Email Security!
Office 365 Users... The booming popularity of the Office 365 solution from Microsoft has brought with it a nasty side effect – unwanted phishing emails. By default, Microsoft offers an email filtering service to eliminate spam and malware called “Exchange Online...
Security Awareness Training: Third-Quarter 2019 Phishing Surge Highlights Need for New Service
Third Quarter 2019 Phishing Surge and Business Email Compromise Highlight Need for Security Awareness Training Based on data through the third quarter of 2019, email phishing attacks climbed to the highest level in more than 3 years. Email remains one of the top...
Proposed Changes to 42 CFR Part 2 will affect Community Health Centers and other Clinics
Proposed changes to 42 CFR Part 2 (Substance Abuse and Confidentiality) will make coordination of care easier! Are you subject to this law?
Business Email Compromise
A Business Email Compromise (BEC) threat targets accounting and finance departments, and looks like it comes from an official email account. Don’t get caught in a phishing scam!
2020 Final MIPS Rule is Out!
On November 1, the Centers for Medicare and Medicaid Services released the 2020 final MIPS rule.
Recovering from a 3rd Generation Ransomware Attack
Recovering from Third-Generation Ransomware Attack Decision-makers need to understand the impacts of a third-generation ransomware attack so that they can properly allocate budgets and set priorities for recovering from ransomware, including: Safeguards that can...