Recent Articles
After a HIPAA Breach: Documenting and Reporting
In the first two installments of this series discussing the next steps HIPAA regulated organizations must take after a security breach. So far, we have looked at: Who is Required to Report a Breach? When Do You Need to Report a Breach? Next, let’s discuss what is to...
Why You Should Make Locking Your Computer a Habit
Many security incidents or even breaches are not caused by sophisticated, malicious hackers but by innocent oversight, carelessness, or lack of understanding of security processes and company policies. Ultimately, the worst IT security incident to deal with is the one...
How Much Will a Healthcare Data Breach Cost Your Company?
Healthcare data breaches have a large impact on the companies that are attacked. Not only do they cause a financial crisis and upset, but also they also affect the reputation your company has built. See the statistics of healthcare data breach below and learn how you...
4 Elements of a Strong Security Policy
An effective security management program relies on various moving parts in a concerted effort to build a formidable organizational security posture. At the foundation of this comprehensive program must be strong documented security policies that reflect the risk...
Ensure HIPAA Compliance by Updating Malware Protection Software
The easiest way to avoid being the victim of a computer virus or malware that can steal or hold hostage your valuable information is to not make yourself vulnerable in the first place. Just like home security, thieves will look for the unlocked door or the house...
Will Healthcare Ransomware Attacks Increase in 2019?
Consumers were singled out in the early days of ransomware, but now ransomware distributors have no problem directing their malicious efforts toward much larger groups, locking organizations out of key systems and demanding a hefty fee that often doesn’t provide full...
AdventHealth: Healthcare Data Breach Goes Undetected for Over a Year
On March 10, 2019, nearly 42,000 patients who have trusted AdventHealth with their personally identifiable information (PII) and health information will be formally notified that this data has been compromised—for more than sixteen months. The Data Breach In late...
Four Steps to Prevent Anarchyware
Background: Just a few months ago, in an office far from the U.S. mainland, a contractor clicked open a seemingly innocuous email and it began. Senior management at a well-known company awoke to their worst nightmare: systems all over their network infrastructure were...
Watch for Dangerous Ransomware in Attachments and Links
Malware and ransomware attacks are nothing new. But tactics are evolving. Platforms once thought impervious, like Mac computers, are now being targeted along with our smartphones and tablets. Clever New Scams The old Nigerian bank scam is joked about today. But...
HIPAA Compliance: Know what’s coming in 2017
Did you know that as of January 2017, there have been more than 1,800 sizeable security breaches of healthcare information? Each of these 1,800 breaches disclosed the patient information of more than 500 people at a time. All of these cases can be viewed on the U.S....
Managed Security Services
Our security and compliance team at Loricca has extensive knowledge and experience to help you navigate today’s cybersecurity landscape. We will work with you to understand your business strategy, and we will develop a strategic plan to effectively deploy a platform and solution that is both cost-effective and will meet security and compliance regulations.