by Gary Pritts | Jul 2, 2014 | HIPAA
HHS Report of Breaches, 2011-2012, Part #1 The U.S. Department of Health and Human Services (HHS) submitted their Annual Report to Congress on Breaches of Unsecured Protected Health Information (PHI), for the calendar years 2011-2012. Theft and loss of computing... Read More
by Gary Pritts | Jun 16, 2014 | HIPAA
As more and more workers purchase and become dependent upon mobile devices, the IT landscape in organizations has dramatically changed. As organizations evolve and develop new “Bring-Your-Own-Device” (BYOD) policies and procedures, they are discovering that many... Read More
by Gary Pritts | Jun 13, 2014 | HIPAA
Health care organizations are constantly challenged to invest adequate resources in IT technology and services. This inside account of a ransomware attack (CryptoWall) and one organization’s response to it sheds some light on the importance of implementing... Read More
by Gary Pritts | May 22, 2014 | HIPAA
Incidents of lost and stolen assets are amount the most common causes of data loss or exposure, as reported by data breach incidents analyzed in Verizon’s 2014 Data Breach Investigations Report. This recent study collected data on over 63,000 confirmed security... Read More
by Gary Pritts | May 12, 2014 | HIPAA
Conducting a meaningful use security risk assessment has been a requirement for HIPAA Covered entities since 2005, and now their business associates must also comply. The Meaningful Use program (Stage 1) also includes the requirement: “Conduct or review a... Read More