<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">

24By7Security Blog

Breach Risk Analysis: A four-step plan

Data breaches have long been a nuisance for many industries, including healthcare and financial services. In the age of[…]

Telehealth, Video Tech Tools and HIPAA Compliance

Telemedicine has been around for years, but as a healthcare service it has been underutilized. Today, virtual visits[…]

Does the HIPAA Privacy Rule apply to the Novel Coronavirus (COVID-19)?

The Novel Coronavirus is officially a global pandemic. The World Health Organization says that a pandemic is the[…]

Challenges and methods for securing Picture Archiving and Communication Systems (PACS)

Medical data is a valuable commodity for identity theft. Despite HIPAA privacy rules being in effect for more than two[…]

Secure Mobile Messaging in Healthcare: 4 Recommendations to Remain HIPAA Compliant

A research study, the State of Clinical Communication and Workflow in healthcare organizations, revealed that 51% of IT[…]

HIPAA Privacy Rules, Mental Health, and Addiction: When can PHI be shared without consent?

HIPAA is designed to protect patient confidentiality. What happens when patient confidentiality conflicts with a[…]

How to be HIPAA compliant on social media

Social media can be a minefield for any business to navigate. When it comes to the combination of patient privacy and[…]

OCR Priorities for 2019-2020

In the recent HIPAA conference organized by the Office of Civil Rights (OCR) and National Institute of Standards and[…]

6 Communication Tips to Regain Patient Trust After a Medical Record Breach

Even with a perfect cybersecurity strategy and implementation, including performing all required steps to be HIPAA[…]

Achieving HIPAA Compliance: Your Guide to Properly Disposing of PHI Hardware

Healthcare organizations upgrade their electronic devices and hardware all the time. Newer, more sophisticated[…]
Subscribe to our Blog!