Can HIPAA Compliance and Social Media Coexist in Your Organization?

The question of whether your organization should be present on social media today is moot. Whether you maintain official accounts on Twitter, Facebook, and other channels, your hospital, practice, and healthcare brand will be found and discussed. The fact that you need to monitor the message broadcasted about your brand is just a reality of … Continued

If You Can’t Prevent Ransomware, You Can Outsmart It

Ransomware is everywhere in 2016. We encourage and work with clients to do everything possible to avoid becoming a victim. Cybercrime is nothing if not adaptive, and the technology and tactics of ransomware continue to evolve daily. They vary from hiding malicious code in tempting or deceiving emails, updates, and links. It seems we cannot … Continued

Always Use Two Factor Authentication but Remain Vigilant

By now, most of the major online tools we use and the most popular sites we log into offer if not require two-factor authentication (2FA). There are several ways a two factor system can be implemented but, essentially, it will always involve using something you know, like a password, plus something you have, like a mobile device … Continued

Incident Response 101: Where Notification Requirements May Differ from HIPAA

In our recent series of articles answering the key questions about what notifications steps HIPAA regulated organizations must take after a security breach, we have looked at: Who is Required to Report a Breach? When Do You Need to Report a Breach?  What Must Be Reported Following a Breach? To wrap up this topic, we … Continued

Do the Apps on Your Phone Know Too Much About You?

I have read that most of us only use 7-10 apps on our phones. The vast majority of the time, when we are on our mobile devices, we are using one of our go-to apps. I just counted 57 apps installed on my phone and, honestly, when I just looked to count, I didn’t even … Continued

Incident Response 101: When Do You Need to Report a Breach?

In Part One of this series of articles discussing the basic considerations of Incident Response best practices, we began with understanding who is required to report a security incident to regulatory authorities, government agencies, or consumers/patients. In Part Two, we review when an incident must be reported. In future articles we will also consider what is to … Continued

Protect Your Company’s “Whales” from Email Fraud and Cybercrime

We have warned many times about the dangers of “phishing” scams. Cyber criminals try to trick people into revealing key personal or financial information or into clicking a link that will take them to a malware site where their system can be compromised and accessed to allow the hacker access to all sorts of valuable … Continued

Your Cyber Security Hat Trick

Even after the Tampa Bay Lightning won the Stanley Cup in 2004, many people still seem surprised that there’s hockey in Florida – great hockey! Hockey in Tampa Bay, where Loricca is based, is a big deal.  From the little guys through high school and, of course, the Bolts. We don’t really understand why, when … Continued

Ransomware And Healthcare

Is your healthcare organization at risk? Ransomware is not going away in 2017—Life Threatening to the Healthcare Industry. Previously: “The Reality of Ransomware in 2016” Ransomware in 2017 is a sophisticated type of malware that is persistently targeting the healthcare industry.  Reports indicate that attacks are growing at a shocking rate and the tools used … Continued

Is your organization HIPAA compliant?

Contact us to find out sooner rather than later.

Ask about our letters of attestation that demonstrate your compliance!