<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">

24By7Security Blog

Subscribe to our Blog!

How to be HIPAA compliant on social media

Social media can be a minefield for any business to navigate. When it comes to the combination of patient privacy and[…]

OCR Priorities for 2019-2020

In the recent HIPAA conference organized by the Office of Civil Rights (OCR) and National Institute of Standards and[…]

How a cyber range helps IT security teams in getting ready for a cyber attack

Imagine a team of IT security professionals connecting to a simulated security environment, when suddenly one of them[…]

6 Communication Tips to Regain Patient Trust After a Medical Record Breach

Even with a perfect cybersecurity strategy and implementation, including performing all required steps to be HIPAA[…]

The Gramm-Leach-Bliley Safeguards Rule: 4 Lessons Learned from Equifax

Complying with the Gramm-Leach-Bliley Act (GLBA) is required, not optional. Given the July 2019 Equifax breach[…]

Achieving HIPAA Compliance: Your Guide to Properly Disposing of PHI Hardware

Healthcare organizations upgrade their electronic devices and hardware all the time. Newer, more sophisticated[…]

FFIEC E-Banking Security Guidelines: What You Need to Know

E-banking can be convenient and improve customer service along with other benefits. However, as with any process that[…]

Ensuring Your HIPAA Compliance with Business Associate Agreements

The Healthcare Insurance Portability and Accountability Act (HIPAA) is legislation that regulates the security[…]

Building Patient Trust by Nurturing a Culture of Privacy

Creating and maintaining a culture of data privacy in your organization is vital in today’s digitally-driven healthcare[…]

Does Your Business Need to Comply with The California Consumer Privacy Act?

When the European Union’s General Data Protection Regulation (GDPR) came into effect, the stipulations of this act had[…]