<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

The Healthcare Sector Is Under Attack!

Today, regardless of the industry one is in, cyber-attacks are relevant to their personal lives. This can be seen[…]

HHS OCR Offers Advice for Preventing Three Top Cyberattacks in Healthcare

In addition to tracking and imposing penalties for HIPAA violations and data breaches, the U.S. Department of Health &[…]

Six Common HIPAA Violations and how you can prevent them

HIPAA compliance is an ongoing process.  Do you have security and privacy policies and procedures for your[…]

Is it time for your Annual HIPAA Risk Assessment?

Table of Contents: Is it time for your Annual HIPAA Risk Assessment? Top 5 actions you can take to prepare for your[…]

How Do I Report An Unsecured Protected Health Information (PHI) Breach?

Have you had a HIPAA Breach?  Here's how you report it. If you are a covered entity and have experienced the loss or[…]

10 Steps to help prevent Breaches of PHI

You may have heard of healthcare organizations struggling to comply with HIPAA. The Health Insurance Portability[…]

Do Dentists Need To Comply With HIPAA?

In April 2018, a dental office in New Jersey, Michael Gruber, DMD, PA reported that their computers were hacked and[…]

Understanding the HIPAA Security Rule: Part III – Administrative Safeguards

In the final post of this blog series, we will cover the Administrative Safeguards required for covered entities as set[…]

Understanding the HIPAA Security Rule: Part II - Technical Safeguards

Welcome to Part II of this series regarding the HIPAA Security rule. As a reminder, the HIPAA Security Rule is broken[…]

Understanding the HIPAA Security Rule: Part I - HIPAA Physical Safeguards

While HIPAA covers a broad scope of healthcare related items, its Security Rule specifically sets forth standards[…]
Subscribe to our Blog!
Content not found